Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chants Black Basta’s Chat
Global Security

Chants Black Basta’s Chat

AdminBy AdminMarch 19, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 19, 2025Red LakshmananCybercrime / Intelligence threats

Recently Leak Chat internal magazines Among the members of the Black Basta Ransomware Operation found possible links between the gang of electronic crimes and the Russian authorities.

A leak containing more than 200,000 reports from September 2023 to September 2024 was published by Telegram @Exploitwhispers.

According to the analysis of the Cybersecurity Company Trellix, allegedly leader Black Basta Oleg Nefedov (aka GG or AA) may have received assistance from Russian officials After his arrest In Yerevan, Armenia, in June 2024, which allowed him to escape in three days.

Cybersecurity

In GG reports he claimed to contact high -ranking officials to go through the “green corridor” and promote prey.

“This knowledge of chat leaks burden Black Basta Gang completely giving up – Note.

Among other notable conclusions that include –

  • The group most likely has two offices in Moscow
  • The group uses Openai Chatgpt to make fraudulent official letters in English
  • Some group members intersect with other extorting operations as Rub and Cactus
  • Developer Fierce This is a Ukrainian citizen who goes on the Internet -Pseudonim Mecor (aka N3auxaxl), and that to develop a loading message on malware, Black Basta was required in the year QakbotFailure
  • Group rented A dark shield from Rastafareye and used theft Lumma to steal credentials as well as additional malicious programs
  • The group developed a frame after operation and control (C2) called Breaker to establish persistence, evasion and maintain access to network systems
  • GG worked with Mecor over New Ransomware, which comes from the original code, which led to the release of a prototype written in C, which testifies to possible rebranding efforts

Development comes when ECLEcticiq has discovered the work of Black Basta over a rough frame called Butbed, which is designed to perform automated online scanning and credentials against edge network devices, including widely used firewalls and VPN solutions in corporate networks.

Cybersecurity

There are data that suggest that the CyberCrime crew uses a PHP platform since 2023 to carry out large -scale credentials and gross attacks on target devices, allowing the threat to the subjects to get visibility on the victim networks.

“Brutus Basis allows Black Basta branches to automate and scale these attacks, expanding your victim pool and accelerating monetization to manage the extorting operations,” Horde Bujakai’s security researcher – Note.

“Internal communication shows that Black Basta has greatly put into a brutal frame, which allowed the fast scanning of the Internet network and large-scale accounting for focus on weak passwords.”

Found this article interesting? Keep track of us next Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.