Thursday, April 24, 2025
Homecyber securityBlack Basta's Notorious Tactics and Techniques Exposed in Leaked Intel

Black Basta’s Notorious Tactics and Techniques Exposed in Leaked Intel

Published on

SIEM as a Service

Follow Us on Google News

A significant leak of internal chat logs from the Black Basta ransomware group has provided cybersecurity researchers with unprecedented insight into their operations, capabilities, and motivations.

The leak, released on February 11, 2024, by a Telegram user named ExploitWhispers, contained approximately 200,000 chat messages dated between September 2023 and June 20241.

This event rivals the 2022 leaks that affected the Conti ransomware gang, offering a rare glimpse into one of the most impactful ransomware groups of recent years.

- Advertisement - Google News

Ransomware Group’s Operations Unveiled

Threat hunters at Intel 471 have updated their threat intelligence with newly uncovered Tactics, Techniques, and Procedures (TTPs) based on the leaked information.

These include reconnaissance via discovery tools, defense evasion through abuse of Windows components, credential access using Mimikatz, and command and control access via the AnyDesk application.

The group also employs PowerShell for file downloads and execution, utilizes Rclone for data exfiltration, and achieves persistence through scheduled task creation.

Advanced TTPs and Critical Infrastructure Targeting

Black Basta, a Russian-speaking group operating under the Ransomware-as-a-Service (RaaS) model, has targeted numerous countries worldwide, including the United States, Japan, Australia, and the United Kingdom.

A joint report from CISA and the FBI released on May 10, 2024, detailed the group’s major activities between April 2022 and May 2024, revealing that they had targeted over 500 entities across North America, Europe, and Australia, affecting 12 out of 16 critical infrastructure sectors.

The ransomware group’s modus operandi involves encrypting files on victims’ computers or networks and employing a double extortion tactic, threatening to publish exfiltrated data if the ransom is not paid.

Their initial access techniques typically include phishing emails with malicious attachments or links, compromised websites, and exploitation of known vulnerabilities.

Recently, a Black Basta affiliate has been observed sending overwhelming amounts of spam emails to victims, followed by phone calls posing as IT staff to trick users into downloading remote support tools.

Once access is gained, Black Basta operators conduct network scans and reconnaissance using tools like SoftPerfect (netscan.exe).

They employ BITSAdmin and PsExec for lateral movement and utilize Splashtop, Screen Connect, and Cobalt Strike beacons to assist in their operations.

The group has been known to use Rclone and WinSCP for file exfiltration before encrypting data across local and network drives.

The exposure of Black Basta’s internal communications and operational details provides valuable intelligence for cybersecurity professionals and law enforcement agencies.

This information can be crucial in developing more effective defense strategies and mitigation techniques against this persistent and evolving ransomware threat.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

NVIDIA NeMo Vulnerability Enables Remote Exploits

NVIDIA has issued an urgent security advisory addressing three high-severity vulnerabilities in its NeMo...

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution...

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the...

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

NVIDIA NeMo Vulnerability Enables Remote Exploits

NVIDIA has issued an urgent security advisory addressing three high-severity vulnerabilities in its NeMo...

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution...

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the...