Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Black bast ransom leaks of chats reveal internal work and internal conflicts
Global Security

Black bast ransom leaks of chats reveal internal work and internal conflicts

AdminBy AdminFebruary 26, 2025No Comments5 Mins Read
Leaked Black Basta Chat Logs
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Black log leaks basta

More than a year when there was an internal chat out of gang of ransomers known as Black Basta were Posted on the Internet A leak that provides unprecedented visibility of their tactics and internal conflicts among their members.

The Russian language speaks on the Matrix Messaging platform between September 18, 2023 and September 28, 2024, initially traced on February 11, 2025, which goes into the pen OperateWhich claimed that they published the data because the group was aimed at Russian banks. The leak identity remains a mystery.

Black bast He first got into the focus of his focus in April 2022, using now a long -term kakbot (aka QBOT). According to the recommendations published by the US government in May 2024, the crew with double extortion aimed at more than 500 private industries and critical infrastructure in North America, Europe and Australia.

For the elliptical and carvus insurance, the fertile ransom group is estimated Washed at least 107 million dollars In Bitcoin Ransom, he pays more than 90 victims by the end of 2023.

The Swiss Cybersecurity Company noted.

Cybersecurity

Moreover, as they say Cactus (AKA Education Mantis) and Akira Ransomware operations.

“Internal Conflict has been conditioned by” Traw “(Licerva-18), a renowned actor of the threat that manages the spam network responsible for the spread of QBOT,”-said Praft in the message on X. “as a key figure in Blackbasta, his actions played , his actions played a major role in the instability of the group. “

Some of the hoscow aspects Leaks containing nearly 200,000 posts below –

  • Paw – one of the main administrators of Black Basta and participates in administrative tasks
  • Cortez is associated with the QAKBOT group, which sought to distance themselves as a result of the black bost attacks against Russian banks
  • YY – Another Black Basta Administrator who is involved in support tasks
  • Trump is one of the pseudonyms for the “Main Boss Group” by Oleg Nefedov, who goes by the names of GG and AA
  • Trump and another person bio Accounts Redemption Scheme
  • Believed that one of Black Basta branches is a minor aged 17
  • Black basta started actively Include social engineering In their attacks after success Scattered spider

According to Qualys, the Black Basta group uses known vulnerabilities, incorrect configurations and insufficient security control to obtain initial access networks. Discussions show that SMB incorrect configurations, exposed RDP servers and weak authentication mechanisms are used regularly, often relying on the default VPN accounts or cut credentials.

20 best CVE which are actively exploited Black Basta

Another key vector of the attack entails the deployment of malware to provide malware. In further attempt to avoid detection, the electronic crimes group uses legitimate file sharing platforms such as transfer.sh, temp.sh and send.vis.ee to place useful loads.

“Boarding Business programs no longer take their time if they violate the organization network,” Said Abasi, the QualS (TRU) research manager, – Note. “Recently, data leaks from Black Basta show that they are moving from the initial access to compromise in a whole within hours of even minutes.”

The disclosure of information occurs when the research group of the Check Point showed that the Ransomware CL0P group resumed organizations aimed at organizing organizations that have been broken on the data leak after operation of recent security deficiencies (Cve-2024-50623) Impact on Cleo file transfer software.

“CL0P addresses directly to these companies, providing secure chat links and e -mail addresses for the victims to start contact,” the company – Note In an update last week. “The group warned that if companies continue to ignore them, their full names will be disclosed within 48 hours.”

Development also follows from an advisory, cybersecurity and infrastructure agency (CISA) on the waves of data and redeeming attacks organized by ghosts focusing on organizations in more than 70 countries, including China.

Cybersecurity

The group is observed that rotates the executed load by switching the file extension to encrypted files, and changing the ransom text led by the group, called other names such as CRING, CRYPT3R, PHANTOM, Strike, Hello, WickRme, Hsharada and Rapture.

“Since the beginning of 2021, the actors -the ghosts began to attack the victims whose online services have conducted outdated versions of the software and firmware,” Agency – Note. “Ghost subjects located in China conduct these widespread attacks on financial benefits. Victims victims include critical infrastructure, schools and universities, health care, public networks, religious institutions, technology and production companies, and numerous enterprises size ”.

As you know, GHOST uses a public code to use systems that stand online using different vulnerabilities in Adobe Coldfusion (Cve-2009-3960. Cve-2010-2861), Fortinet Fortinet devices (Cve-2018-13379) and the Microsoft Exchange server (Cve-2021-34473. Cve-2021-34523and Cve-2021-31207AKA Proxyshell).

After successful operation, the deployment of the web is accompanied by the deployment, which is then used to download and execute a cable strike. The actors of the threat were also observed using a wide range of tools such as Mimikatz and Badpotato for the accounting and escalation of privileges respectively.

“Ghost actors used increased access and management of Windows control tools (WMIC) to launch PowerShell commands on additional systems on the frequent victim network with the aim of initiating additional Bobalt Strike Bakeman infections,” Cisa said. “In cases where the attempts of the side movements are unsuccessful, the ghostly actors said that he was refusing to attack the victim.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.