Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 30, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 30, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 30, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 30, 2025

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025

      The Witcher 3: Wild Hunt reaches 60 million copies sold as work continues on The Witcher 4

      May 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      How Remix is shaking things up

      May 30, 2025
      Recent

      How Remix is shaking things up

      May 30, 2025

      Perficient at Kscope25: Let’s Meet in Texas!

      May 30, 2025

      Salesforce + Informatica: What It Means for Data Cloud and Our Customers

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025
      Recent

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Black Basta Chat Logs Reveal Ransomware Group’s TTPs, IoCs

    Black Basta Chat Logs Reveal Ransomware Group’s TTPs, IoCs

    February 26, 2025

    Black Basta ransomware group leak

    The Black Basta ransomware group has fallen off dramatically in 2025, and chat logs leaked recently show that internal squabbling may be behind the group’s slowed activity.

    Cyble threat intelligence researchers documented 189 Black Basta victims in 2024. Nearly two months into 2025, that number has fallen to eight. Two weeks ago, a Telegram user who goes by ExploitWhispers leaked the group’s chat logs, which revealed infighting and disagreement over targets among Black Basta members.

    What might be more useful, however, is an examination of what the chat logs tell us about Black Basta TTPs (tactics, techniques and procedures). So we queried a ChatGPT instance set up by security researchers to examine the Black Basta data, which includes nearly 200,000 chat messages sent between September 2023 and September 2024, to glean indicators of compromise (IoCs), TTPs and more.

    The chat logs appear to include new information on the group beyond what had previously been reported by CISA and others, including newer vulnerabilities under discussion by group members.

    Black Basta first appeared in April 2022, likely formed by former members of the Conti and REvil ransomware groups, and Cyble has since documented 528 victims of the group.

    Black Basta TTPs Revealed by Leaked Chat Logs

    According to the chat logs, Black Basta favors compromised remote access points for initial access, such as use of Remote Desktop Protocol (RDP) and VPN credentials.

    Malicious scripts follow, including use of VBS (Visual Basic Script) files to execute malicious payloads​, and command execution via rundll32.exe, a common method for running DLL-based payloads​.

    File names such as drs1312_signed.zip suggest the use of digitally signed executables to evade detection.

    Numerous discussions about ESXi hypervisor vulnerabilities included mentions of systems allowing default passwords, and several leaked login credentials for various services suggest that the group employs credential stuffing, brute force, and/or phishing tactics​​.

    Command and Control (C2) is established by SOCKS proxy servers and SSH command execution, with rotating domains for malware downloads and C2 communication​.

    Black Basta also uses obfuscation and encryption techniques, with group members discussing antivirus (AV) evasion tactics, and files like e6393196-f020-4c2f-88fc-45ff7e22794f_encrypt_release_allsystem_x64.zip indicate whole-system encryption tactics​. Discussions also mentioned custom-built AV/EDR disablers, and Qakbot trojan evasion, injection and persistence mechanisms​.

    The group used Cobalt Strike with multiple modifications, including a custom-built Artifact Kit for modifying Cobalt Strike payloads​, the Elevate Kit to integrate privilege escalation exploits​, the Sleep Mask Kit for memory obfuscation and AV evasion​, and the Mutator Kit to modify compiled binaries​. Mimikatz is another frequently used tool.

    Hostinger

    Members have also spoofed IT calls, posing as IT support to obtain access and bypass security​.

    Vulnerabilities Targeted by Black Basta

    The chat logs contain a long list of vulnerabilities under discussion by Black Basta members, ranging from Linux and Windows vulnerabilities to network devices, open source frameworks, IT tools and more, and in some cases the group appears to have chained vulnerabilities together.

    Specific CVEs targeted by Black Basta include:

    • CVE-2022-30190: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution (RCE) vulnerability
    • CVE-2021-44228: The Log4j “Log4Shell” vulnerability
    • CVE-2022-22965: Spring Framework “Spring4Shell” vulnerability
    • CVE-2022-1388: F5 BIG-IP REST authentication vulnerability
    • CVE-2022-0609: Use after free vulnerability in Animation in Google Chrome
    • CVE-2017-11882: Microsoft Office memory corruption vulnerability
    • CVE-2022-41082 and CVE-2022-41040: the Microsoft Exchange “ProxyNotShell” vulnerabilities
    • CVE-2022-27925 and CVE-2022-41352: Zimbra Collaboration vulnerabilities that were used together to gain access and execute a reverse shell
    • CVE-2022-26134: Atlassian Confluence RCE vulnerability
    • CVE-2022-30525: Zyxel RCE vulnerability

    More recent vulnerabilities under discussion by the group have included:

    • CVE-2024-21762: Fortinet FortiOS RCE
    • CVE-2024-3400: GlobalProtect RCE in Palo Alto Networks PAN-OS
    • CVE-2024-1709: ConnectWise ScreenConnect RCE
    • CVE-2024-26169: Windows Error Reporting Service elevation of privilege vulnerability
    • CVE-2024-23897: A Jenkins CI/CD pipeline vulnerability
    • CVE-2024-1086: A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component

    Black Basta File Hashes and Indicators of Compromise (IoCs)

    From ransomware files and malware samples to C2 IPs, domains, and compromised credentials, the chat logs also revealed a range of Black Basta indicators of compromise (IoCs).

    Ransomware files include:

    • e6393196-f020-4c2f-88fc-45ff7e22794f_encrypt_release_allsystem_x64.zip
    • zip
    • CVE-2022-27925-zimbra_Revshell.zip (a backdoored Zimbra exploit)​

    Black Basta has been associated with various malware families, including RemcosRAT, AgentTesla, FormBook, and GuLoader. File hashes from shared malware samples include:

    • Remcos RAT: c5793613219a782eb08205921a3f9ed97c2c74de18e0cd36008046d1a5e1288e
    • Agent Tesla: 50d414576bf441cca754e6e3b96dabdf35fed443ecb98f865dc89e623bc2f0e9
    • Formbook: e19dfc72ad2eea815ef6b4eb9b812471b3bb3cf40333d97e3c552c87db86e65a
    • GuLoader: 5a2f52bb90ed8a2fd9bc0e07937684ac9b9389cdd112760f8dc96e16aa63d513​

    IP addresses used by the group for botnet communication, command-and-control (C2), and proxies have included:

    • 214.25.250
    • 8.18.230
    • 161.27.152
    • 98.80.158
    • 60.149.244
    • 227.252.244
    • 238.181.250
    • 118.36.203
    • 60.149.241
    • 165.16.55​
    • 57.243.97 (used for shell, SOCKS, FTP)​
    • 253.64.241 (used in UK-based attacks)​

    The Biggest Ransomware Group Leak Since Conti

    The Black Basta chat log leak is likely the biggest leak to hit a ransomware group since Black Basta predecessor Conti was hit by a source code leak in 2022.

    So while the infighting is certainly entertaining and sheds light on the group’s dynamics, the many tactical details revealed provide a rich data source for threat intelligence researchers and security teams whose job is to stop and respond to threats from Black Basta and others who may adopt its tactics.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleLeaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles
    Next Article SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent

    Related Posts

    Security

    China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

    May 31, 2025
    Security

    New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks

    May 31, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Implementing an Accordion with JavaScript: A Simple Guide

    Development

    Massive Cyberattack Hits Ukraine Railways, Disrupting Online Ticket Sales

    Development

    Senses I’m Still Breathing Tour 2025 T Shirts

    Development

    CVE-2025-47295 – Fortinet FortiOS Buffer Over-Read Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    The 30+ best Black Friday Apple deals 2024: Early sales available now

    November 1, 2024

    We found the best early Black Friday deals on Apple products like iPhones, iPads, MacBooks,…

    Easily Toggle Ubuntu’s New Wellbeing Reminders On/Off

    May 8, 2025

    How to extract a number from response body in jmeter?

    July 4, 2024

    The release date for the long-awaited return of a beloved Square Enix franchise has been announced

    June 12, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.