“The girl should be calling men.” Leak exposes Black Basta’s influence tactics.

Date:

Share:



A leak of 190,000 chat messages traded among members of the Black Basta ransomware group shows that it’s a highly structured and mostly efficient organization staffed by personnel with expertise in various specialities, including exploit development, infrastructure optimization, social engineering, and more.

The trove of records was first posted to file-sharing site MEGA. The messages, which were sent from September 2023 to September 2024, were later posted to Telegram in February 2025. ExploitWhispers, the online persona who took credit for the leak, also provided commentary and context for understanding the communications. The identity of the person or persons behind ExploitWhispers remains unknown. Last month’s leak coincided with the unexplained outage of the Black Basta site on the dark web, which has remained down ever since.

“We need to exploit as soon as possible”

Researchers from security firm Trustwave’s SpiderLabs pored through the messages, which were written in Russian, and published a brief blog summary and a more detailed review of the messages on Tuesday.

“The dataset sheds light on Black Basta’s internal workflows, decision-making processes, and team dynamics, offering an unfiltered perspective on how one of the most active ransomware groups operates behind the scenes, drawing parallels to the infamous Conti leaks,” the researchers wrote. They were referring to a separate leak of ransomware group Conti that exposed workers grumbling about low pay, long hours, and grievances about support from leaders for their support of Russia in its invasion of Ukraine. “While the immediate impact of the leak remains uncertain, the exposure of Black Basta’s inner workings represents a rare opportunity for cybersecurity professionals to adapt and respond.”

Some of the TTPs—short for tactics, techniques, and procedures—Black Basta employed were directed at methods for social engineering employees working for prospective victims by posing as IT administrators attempting to troubleshoot problems or respond to fake breaches.



Source link

━ more like this

Here’s our first look at the Paranormal Activity game from the maker of The Mortuary Assistant

A teaser shared at the end of the Indie Horror Showcase this week gives us a better idea of what the upcoming found...

Dodgers vs. Blue Jays, Game 2 tonight: How to watch the 2025 MLB World Series without cable

The League Championship Series are history, and the final two teams have emerged: The 2025 Fall Classic will see the Los Angeles Dodgers...

Blumhouse is adapting Something is Killing the Children for a live-action film and animated series

The hit horror comic series Something is Killing the Children is headed to the big (and small) screen. According to The Hollywood Reporter,...

Relive the Commodore 64’s glory days with a slimmer, blacked-out remake

The Commodore 64 is back in black, sort of. Retro Games and Plaion Replai released a limited edition redesign of the best-selling computer,...

Chinese startup shows off a dancing humanoid robot that starts at $1,400

For roughly the same price as a flagship smartphone, you could instead buy an affordable humanoid robot that's meant for consumer and educational...
spot_img