BlackBasta Ransomware Attack on Ascension Health: Clinical Operations Disrupted

ByThreat Analyst

17 May 2024

Black Basta, Ascension, ransomware, healthcare, clinical disruption, double extortion, incident response, MITRE ATT&CK


1. Executive Summary

On 8 May 2024, US healthcare provider Ascension detected suspicious activity and enacted downtime procedures after a cybersecurity event disrupted access to parts of its technology environment, impacting clinical operations across its footprint. According to Ascension’s public updates, the incident led to interruptions affecting systems used for routine workflows, with later confirmation that attackers accessed a small number of file servers and exfiltrated files that may have included PHI/PII, while Ascension stated it had no evidence that data was taken from its EHR and other clinical systems. See Ascension’s Network Interruption Update (9 May 2024) and Cybersecurity Event Update (12 June 2024).

Multiple credible outlets linked the incident to Black Basta, a prominent ransomware operation known for double extortion (encrypting systems while stealing data to pressure victims). Reporting at the time noted operational impacts including ambulance diversions in some locations. See Reuters’ incident reporting (8–9 May 2024) and Associated Press coverage of disruptions.

From a threat-intelligence perspective, the Ascension case reinforces a persistent reality: healthcare environments remain highly susceptible to ransomware due to the operational risk created by downtime, the complexity of interconnected clinical workflows, and the sensitivity of patient data.


2. Contextual Background

2.1 Nature of the threat

Ascension characterised the incident as a ransomware attack in later public communications, with investigation milestones published on its incident updates page. See Ascension’s Cybersecurity Event Update (timeline and FAQs).

Black Basta is widely assessed as a ransomware-as-a-service (RaaS) ecosystem employing double extortion. For background on Black Basta’s model and behaviours, see Unit 42’s Black Basta threat assessment.

2.2 Threat-actor attribution

Confidence: Likely (B2)
Ascension did not publicly name the responsible actor in its initial statements. However, multiple reputable sources connected the disruption to Black Basta around the time of the event, based on reporting and sector warnings. See Reuters’ coverage of the Ascension disruption and Healthcare IT News reporting on the Black Basta linkage.

For actor ecosystem context, Google’s threat-intelligence reporting tracks UNC4393 as a financially motivated cluster and “primary user of BASTA ransomware,” historically leveraging botnet-driven initial access pathways. See Google Cloud: UNC4393 and BASTA ransomware.

CrowdStrike also frames Black Basta usage within its broader eCrime adversary modelling (noting an adversary that “likely developed and has used Black Basta since April 2022”). See CrowdStrike’s WANDERING SPIDER profile.

2.3 Sector and geographic targeting

Healthcare is routinely cited as a high-value target for Black Basta and similar ransomware crews due to the urgency of clinical operations and the monetisation potential of PHI. In the immediate aftermath of Ascension’s disruption, sector bodies urged heightened vigilance, describing an acceleration of attacks against healthcare. See Health-ISAC bulletin on Black Basta and healthcare and related reporting Healthcare IT News coverage.


3. Technical Analysis

3.1 Observed intrusion pathway and mapped TTPs

Ascension’s investigation stated the attacker gained access after an employee downloaded a malicious file believed to be legitimate. See Ascension spokesperson statement (12 June 2024).

Mapped to MITRE ATT&CK, this aligns most directly with:

For broader Black Basta tradecraft commonly highlighted in public reporting and sector advisories, Infoblox summarised a range of ATT&CK techniques attributed to Black Basta activity and referenced a government alert as the underlying source. See Infoblox analysis of Black Basta kill chain and ATT&CK mapping. Techniques called out there include:

3.2 Exploitation status and public PoCs

Ascension publicly confirmed ransomware and file theft, but did not disclose a specific exploited vulnerability, exploit chain, or tooling used in this incident. See Ascension’s Cybersecurity Event Update (12 June 2024).

Unconfirmed media reporting suggested Black Basta involvement and described operational impacts (including ambulance diversions) during the disruption period; however, those reports did not provide verifiable technical artefacts suitable for defensive validation. See Associated Press coverage and Reuters incident reporting.


4. Impact Assessment

4.1 Severity and scope

Operationally, the incident forced downtime workarounds and degraded service delivery in multiple locations, with public reporting describing diversions and postponements. See Associated Press: disruptions and diversion impacts.

From an information security standpoint, Ascension later stated attackers accessed seven file servers (out of approximately 25,000 servers in its environment) and may have taken files containing PHI/PII. See Ascension’s 12 June 2024 statement.

Ascension subsequently completed its data review and began notifying affected individuals, noting data “may include” medical, payment, insurance, and government identification information, while stating it had no evidence of data taken from EHR and other clinical systems. See Ascension’s 19 December update and FAQs.

Public reporting later indicated the incident affected approximately 5.6 million people, based on regulatory reporting and media coverage. See Reuters report on the scale of impact (20 Dec 2024).

4.2 Victim profile

Ascension is a large US non-profit healthcare system operating across multiple states, with a sizeable hospital footprint. See Reuters’ profile context in incident reporting.


5. Indicators of Compromise (IOCs)

5.1 IOC table

Ascension has not published technical IOCs (hashes, IPs, domains) tied specifically to its environment.

However, public reporting on Black Basta includes sets of domains associated with Black Basta-related activity, presented by reputable vendors referencing government alerting. These can be useful for threat hunting and preventive blocking, but defenders should treat them as Black Basta ecosystem indicators, not Ascension-specific artefacts.

TypeValueContext/NotesSource
Domaintrailshop[.]netReported as Black Basta-associated malicious domainInfoblox Black Basta DNS analysis
Domainrealbumblebee[.]netSame as aboveInfoblox Black Basta DNS analysis
Domainrecentbee[.]netSame as aboveInfoblox Black Basta DNS analysis
Domainwebnubee[.]comSame as aboveInfoblox Black Basta DNS analysis
Domainbuyblocknow[.]comSame as aboveInfoblox Black Basta DNS analysis
Domainmagentoengineers[.]comSame as aboveInfoblox Black Basta DNS analysis
Domainthesmartcloudusa[.]comSame as aboveInfoblox Black Basta DNS analysis
Domainsecurecloudmanage[.]comSame as aboveInfoblox Black Basta DNS analysis
Domainnebraska-lawyers[.]comSame as aboveInfoblox Black Basta DNS analysis
Domainprotectionek[.]comSame as aboveInfoblox Black Basta DNS analysis

(The Infoblox source lists additional domains; the above table includes a representative subset for brevity. Defensive teams should evaluate the full list in the referenced publication.)

5.2 Detection guidance

Practical detection opportunities aligned to the behaviours described in public reporting include:

  • User execution and initial foothold: alert on suspicious downloads and subsequent execution chains, especially where the initial file originates from newly registered domains or unusual referrers (aligns with T1204.002).
  • PowerShell abuse: monitor for encoded commands, unusual parent processes, and PowerShell used to modify security tooling (aligns with T1059.001 and T1562.001).
  • Backup and recovery sabotage: detect vssadmin.exe delete shadows, wmic shadowcopy delete, and related activity (aligns with T1490).
  • Ransomware impact: rapid multi-extension file rewrites, mass rename patterns, and spikes in file entropy changes (aligns with T1486).

For ready-to-adapt detection content:


6. Incident Response Guidance

6.1 Containment, eradication, recovery

  1. Stabilise clinical operations: prioritise safe downtime workflows and ensure clinical leadership and IT incident command remain synchronised (Ascension’s experience highlights the real-world necessity of rehearsed downtime). See Ascension’s initial disruption acknowledgement.
  2. Isolate suspected ingress points: quarantine endpoints associated with the initial malicious download, disable affected accounts, and rotate credentials for any user or service accounts with exposure.
  3. Scope file server compromise: validate integrity, access logs, and data staging evidence across file servers likely used for routine associate workflows (as described by Ascension). See Ascension’s file server statement.
  4. Hunt for persistence: validate scheduled tasks, services, remote management tools, and authentication artefacts across high-value segments.
  5. Recover securely: restore systems in priority order (EHR, pharmacy, lab ordering, imaging, scheduling), applying hardening before reconnecting segments. Ascension’s published restoration updates illustrate the phased approach many large health systems must follow. See Ascension restoration updates (June 2024).

6.2 Forensic artefacts to collect

  • Endpoint telemetry for the initial user/device involved (download provenance, browser history, file hashes, execution tree).
  • File server access logs, SMB logs, and unusual archive or staging activity.
  • Identity artefacts: SSO logs, MFA events, conditional access decisions, and anomalous sign-ins.
  • Network logs: DNS queries (especially to newly registered domains), proxy logs, and egress anomalies.

6.3 Lessons learned

  • Healthcare-specific resilience depends on well-rehearsed downtime procedures and “offline-first” contingencies for ordering, medication workflows, and imaging. The Ascension disruption period shows that even partial system loss has material patient-care consequences. See Associated Press reporting on operational disruption.

7. Threat Intelligence Contextualisation

7.1 Similar incidents and tradecraft

Black Basta’s double-extortion approach is consistent with broader ransomware trends tracked by major CTI publishers. Unit 42’s assessment describes the group’s leak-site pressure model as central to its operations. See Unit 42 Black Basta assessment.

Google’s reporting on UNC4393 provides further context on how the BASTA ecosystem historically leveraged initial access mechanisms at scale (noting botnet-linked distribution patterns in prior periods). See Google Cloud: UNC4393 and BASTA ransomware.

7.2 Full MITRE ATT&CK mapping

TacticTechnique IDTechnique NameObserved Behaviour
Initial AccessT1204.002User Execution: Malicious FileAscension stated an employee accidentally downloaded a malicious file believed to be legitimate. See Ascension (12 June 2024).
Initial AccessT1566PhishingCommonly cited in Black Basta activity summaries and sector advisories. See Infoblox Black Basta kill chain mapping.
Initial AccessT1190Exploit Public-Facing ApplicationCited as a recurring Black Basta technique in public reporting of their activity patterns. See Infoblox Black Basta kill chain mapping.
Defence EvasionT1036MasqueradingReported in Black Basta technique summaries. See Infoblox Black Basta kill chain mapping.
Defence EvasionT1562.001Impair Defences: Disable or Modify ToolsReported in Black Basta technique summaries. See Infoblox Black Basta kill chain mapping.
ExecutionT1059.001PowerShellReported in Black Basta technique summaries. See Infoblox Black Basta kill chain mapping.
ImpactT1490Inhibit System RecoveryReported in Black Basta technique summaries. See Infoblox Black Basta kill chain mapping.
ImpactT1486Data Encrypted for ImpactAscension described the event as ransomware and later reported restoration of impacted systems. See Ascension incident FAQ.

8. Mitigation Recommendations

8.1 Actionable hardening steps

  • Reduce user-execution risk: tighten browser download controls, enforce application allowlisting for common dropper locations, and expand security awareness around “legitimate-looking” files (directly relevant given Ascension’s described initial access). See Ascension (12 June 2024).
  • Strengthen identity controls: enforce phishing-resistant MFA for privileged access, continuous authentication, and conditional access policies to limit lateral movement opportunities.
  • Segment clinical workloads: ensure EHR, pharmacy, lab, imaging, and scheduling are segmented with strict egress controls and monitored inter-segment trust boundaries.
  • Instrument file server activity: deploy high-fidelity alerting for mass file access, anomalous archive creation, unusual service account usage, and atypical SMB session patterns.

8.2 Patch management advice

Ascension did not disclose a vulnerability exploited in this incident, so prioritisation should focus on:

  • Externally exposed remote access and edge services, and
  • Widely exploited enterprise software vulnerabilities affecting identity and remote management.

Where sector bodies flag active exploitation, align patch SLAs to risk, and enforce compensating controls (WAF rules, MFA, least privilege, network isolation) until patching is complete.


9. Historical Context & Related Vulnerabilities

Healthcare has repeatedly experienced systemic disruption from ransomware, with policy and regulatory attention increasing following major incidents. The Ascension case was frequently discussed alongside other large healthcare disruptions in 2024 in mainstream reporting. See Reuters context on healthcare cyber incidents.


10. Future Outlook

Black Basta’s brand and operational tempo have fluctuated over time, but the underlying capability and affiliate ecosystem dynamics mean tradecraft often persists even when group visibility changes. Public threat-intelligence reporting has described how ransomware operators reorganise and reconstitute across “brands,” sustaining pressure on high-impact sectors such as healthcare. See WIRED analysis of Black Basta’s trajectory and Google Cloud: UNC4393 / BASTA ecosystem context.

For healthcare defenders, the most likely near-term evolution remains: increased emphasis on rapid-impact intrusion pathways, data theft to amplify extortion leverage, and selective targeting of systems that maximally disrupt patient flow.


11. Further Reading

Victim statements and incident reporting

Threat actor and technique context