Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Threat Actors

8Base (Ransomware Group) – Threat Actor

April 19, 2024
Reading Time: 15 mins read
in Ransomware Group, Threat Actors
8Base (Ransomware Group) – Threat Actor

8Base Ransomware

Location

Unknown

Date of initial activity

2022

Suspected attribution

Unknown

Associated Groups

RansomHouse, Phobos, Dharma

Motivation

Financial gain

Associated tools

8Base is known for its double-extortion tactics. The group threatens to publish the encrypted files unless the ransom is paid, aiming to embarrass the victim by exposing private or confidential information that could damage their brand or reputation.

Active

Yes

Overview

Operating since April 2022, 8Base is a ransomware group that has swiftly gained notoriety for its aggressive tactics and targeting of small and medium-sized businesses (SMBs) across sectors such as business services, finance, manufacturing, and information technology. Employing double-extortion tactics, 8Base threatens to expose encrypted files, aiming to tarnish victims’ reputations unless ransom demands are met. Despite a surge in activity during the summer of 2023, 8Base has largely remained under the radar, utilizing encryption and “name-and-shame” strategies to coerce victims into paying. While the group’s modus operandi spans industries, details regarding their identities, methods, and motivations remain elusive. The group’s operational speed and efficiency suggest continuity rather than novelty, indicating a mature organization adept at exploiting vulnerabilities. As 8Base continues its relentless targeting of SMBs, businesses must remain vigilant and fortify their cybersecurity defenses against this persistent threat.

Common targets

Target Countries: United States, Brazil, U.K., Australia, Germany, Canada, Spain, Italy, Belgium.

Target Sectors: Professional Services, Manufacturing, Construction, Finance, Healthcare,Transportation.

Attack Vectors

The 8Base ransomware is thought to spread via Phishing emails, Exploit kits.

Associated Groups

8Base and RansomHouse During the scrutiny of 8Base, researchers uncovered notable resemblances with another entity – RansomHouse. The authenticity of RansomHouse as a ransomware entity is a subject of debate, given its practice of acquiring leaked data, collaborating with data leak platforms, and subsequently extorting companies. Employing the Natural Language Processing model Doc2Vec, researchers identified a striking 99% match between the ransom notes of 8Base and RansomHouse, indicating significant similarities. Delving deeper, researchers conducted a side-by-side comparison of their respective leak sites, revealing a remarkable likeness in language. Notably, the verbiage on 8Base’s welcome page mirrored that of RansomHouse’s, suggesting a deliberate replication. Despite their striking similarities, two primary disparities emerged: RansomHouse actively solicits and recruits partnerships, while 8Base does not. The comparison between these threat actor groups raised the question of whether 8Base may be an offshoot or a copycat of RansomHouse. However, distinguishing between them posed challenges, as RansomHouse lacks a signature ransomware and relies on a variety of ransomware available on dark markets. Interestingly, the investigation into 8Base failed to identify a single ransomware variant, presenting contrasting ransom notes resembling those of RansomHouse and Phobos. 8Base and Phobos Ransomware 8Base and Phobos Ransomware In the pursuit of a ransomware sample linked to 8Base Ransom Group, investigators stumbled upon a Phobos variant employing a “.8base” file extension on encrypted files. Subsequent comparison unveiled that 8Base utilized Phobos ransomware version 2.9.1, leveraging SmokeLoader for initial obfuscation, unpacking, and loading of the ransomware. Given Phobos ransomware’s availability as a ransomware-as-a-service (RAAS), this revelation did not come as a surprise. Despite their shared modus operandi, discernible differences surfaced between the ransom notes of Phobos and 8Base, notably in Jabber instructions and branding elements. While Phobos prominently displayed “phobos” in the top and bottom corners, 8Base substituted it with “cartilage” in the top corner, along with a purple background and the absence of Jabber instructions. Despite appending “.8base” to encrypted files for branding purposes, 8Base’s format mirrored Phobos, encompassing an ID section, an email address, and the file extension. Further scrutiny revealed distinctive traits unique to 8Base Ransom Group, notably the origin of the 8Base sample from the domain admlogs25[.]xyz, linked to SystemBC, a proxy and remote administration tool. Known for encrypting and concealing attackers’ Command and Control traffic, SystemBC has been utilized by various ransomware groups, adding another layer to 8Base’s operational complexity.

How they operate

8Base ransomware payloads will enumerate all available local drives, encrypting standard data file extensions in a rapid and efficient manner using AES256 in CBC mode. Any attached share or drive volume will be subject to the encryption process as well. Once encrypted, files will have the .8base extension appended to them at times accompanied by the victim ID and attacker email address. Local firewall rules will be modified with the following command, issued by the ransomware: netsh advfirewall set currentprofile state off The above command allows the threat actor to evade Windows Defender’s Advanced Firewall capabilities. The ransomware will attempt to remove Volume Shadow Copies (VSS) via the following commands: vssadmin.exe delete shadows /all /quiet wmic shadowcopy delete Payloads have been observed attempting either one or both of these methods: WMIC and VSSADMIN. In addition, BCDEDIT.EXE is used to modify the infected host’s startup policy, disabling recovery mode and related features via the following: bcdedit /set {default} bootstatuspolicy ignoreallfailures Persistence is achieved via entries in the Windows Startup folder as well as in the registry. For example, a copy of the ransom payload will be written to: %AppData%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ This is in addition to writing copies of itself to %AppData%\Local\ and other locations deemed necessary by the threat actors. 8Base ransom notes are written to affected folders as both text and .HTA files.

Significant Attacks

  • 8Base ransomware group utilizes encryption paired with “name-and-shame” techniques to compel their victims to pay their ransom. (June 2023)
References:
  • 8Base Ransomware: A Heavy Hitting Player
  • Dark Web Profile: 8Base Ransomware
  • 8Base Ransomware: In-Depth Analysis, Detection, and Mitigation
Tags: 8BaseAustraliaBelgiumBrazilCanadaFinanceGermanyHealthcareItalymanufacturingRansomwareRansomware GroupSpainThreat ActorsTransportationUnited KingdomUnited States
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial