“The girl should be calling men.” Leak exposes Black Basta’s influence tactics.

Date:

Share:



A leak of 190,000 chat messages traded among members of the Black Basta ransomware group shows that it’s a highly structured and mostly efficient organization staffed by personnel with expertise in various specialities, including exploit development, infrastructure optimization, social engineering, and more.

The trove of records was first posted to file-sharing site MEGA. The messages, which were sent from September 2023 to September 2024, were later posted to Telegram in February 2025. ExploitWhispers, the online persona who took credit for the leak, also provided commentary and context for understanding the communications. The identity of the person or persons behind ExploitWhispers remains unknown. Last month’s leak coincided with the unexplained outage of the Black Basta site on the dark web, which has remained down ever since.

“We need to exploit as soon as possible”

Researchers from security firm Trustwave’s SpiderLabs pored through the messages, which were written in Russian, and published a brief blog summary and a more detailed review of the messages on Tuesday.

“The dataset sheds light on Black Basta’s internal workflows, decision-making processes, and team dynamics, offering an unfiltered perspective on how one of the most active ransomware groups operates behind the scenes, drawing parallels to the infamous Conti leaks,” the researchers wrote. They were referring to a separate leak of ransomware group Conti that exposed workers grumbling about low pay, long hours, and grievances about support from leaders for their support of Russia in its invasion of Ukraine. “While the immediate impact of the leak remains uncertain, the exposure of Black Basta’s inner workings represents a rare opportunity for cybersecurity professionals to adapt and respond.”

Some of the TTPs—short for tactics, techniques, and procedures—Black Basta employed were directed at methods for social engineering employees working for prospective victims by posing as IT administrators attempting to troubleshoot problems or respond to fake breaches.



Source link

━ more like this

Scientists are teaching OLED screens how to shine smarter

You know that annoying moment when you step outside on a sunny day, pull out your phone, and suddenly can’t see a single...

AI chatbots still struggle with news accuracy, study finds

A month-long experiment has raised fresh concerns about the reliability of generative AI tools as sources of news, after Google’s Gemini chatbot was...

Piece by piece, SpaceX preps first Starship flight from Space Coast

SpaceX is making steady progress toward building out the pad at NASA’s Cape Canaveral site in Florida for the first Starship launch from...

Google app leak gives us a glimpse of life with smart glasses and meaningful controls

Ahead of Google’s smart glasses launch, a Reddit user appears to have gained access to the unreleased Glasses companion app via an Android...

You can finally uninstall Microsoft Copilot on Windows 11, but there’s a catch

Microsoft is finally letting some users remove Copilot from Windows, but the fine print makes it clear this is not the clean break...
spot_img