• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Incognito Market

    What the Incognito Market Sentencing Reveals About Dark Web Drug Trafficking

    CISA Silently Updates Vulnerabilities Exploited by Ransomware Groups

    CISA Silently Updates Vulnerabilities Exploited by Ransomware Groups

    Ransomware Attacks 2026

    Ransomware Attacks Have Soared 30% in Recent Months

    Flock Safety ALPR cameras

    Mountain View Shuts Down Flock Safety ALPR Cameras After Year-Long Unrestricted Data Access

    Lakelands Public Health cyberattack

    Lakelands Public Health Confirms Cyberattack, Says Sensitive Data Unaffected

    Foxit PDF Editor

    Foxit Releases Security Updates for PDF Editor Cloud XSS Vulnerabilities

    Spain Ban Social Media Platforms

    Spain Ban Social Media Platforms for Kids as Global Trend Grows

    French Police Raid X Offices as Grok Investigations Grow

    French Police Raid X Offices as Grok Investigations Grow

    social media ban for children France

    France Approves Social Media Ban for Children Under 15 Amid Global Trend

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Incognito Market

    What the Incognito Market Sentencing Reveals About Dark Web Drug Trafficking

    Spain Ban Social Media Platforms

    Spain Ban Social Media Platforms for Kids as Global Trend Grows

    social media ban for children France

    France Approves Social Media Ban for Children Under 15 Amid Global Trend

    ai cybersecurity webinar February 2026

    Lt Gen (Dr) Rajesh Pant to Lead Webinar on AI-Driven Cyber Threats — Register Free Now

    Japanese cybersecurity

    Britain and Japan Join Forces on Cybersecurity and Strategic Minerals

    online piracy

    U.S. and Bulgaria Shut Down Three Major Piracy Websites in EU Crackdown

    Data Privacy Week 2026-Interview

    Ad Fraud Is Exploding — Dhiraj Gupta of mFilterIt Explains How Brands Can Respond

    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    Data Privacy Week 2026

    Canada Marks Data Privacy Week 2026 as Commissioner Pushes for Privacy by Design

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Incognito Market

    What the Incognito Market Sentencing Reveals About Dark Web Drug Trafficking

    CISA Silently Updates Vulnerabilities Exploited by Ransomware Groups

    CISA Silently Updates Vulnerabilities Exploited by Ransomware Groups

    Ransomware Attacks 2026

    Ransomware Attacks Have Soared 30% in Recent Months

    Flock Safety ALPR cameras

    Mountain View Shuts Down Flock Safety ALPR Cameras After Year-Long Unrestricted Data Access

    Lakelands Public Health cyberattack

    Lakelands Public Health Confirms Cyberattack, Says Sensitive Data Unaffected

    Foxit PDF Editor

    Foxit Releases Security Updates for PDF Editor Cloud XSS Vulnerabilities

    Spain Ban Social Media Platforms

    Spain Ban Social Media Platforms for Kids as Global Trend Grows

    French Police Raid X Offices as Grok Investigations Grow

    French Police Raid X Offices as Grok Investigations Grow

    social media ban for children France

    France Approves Social Media Ban for Children Under 15 Amid Global Trend

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Incognito Market

    What the Incognito Market Sentencing Reveals About Dark Web Drug Trafficking

    Spain Ban Social Media Platforms

    Spain Ban Social Media Platforms for Kids as Global Trend Grows

    social media ban for children France

    France Approves Social Media Ban for Children Under 15 Amid Global Trend

    ai cybersecurity webinar February 2026

    Lt Gen (Dr) Rajesh Pant to Lead Webinar on AI-Driven Cyber Threats — Register Free Now

    Japanese cybersecurity

    Britain and Japan Join Forces on Cybersecurity and Strategic Minerals

    online piracy

    U.S. and Bulgaria Shut Down Three Major Piracy Websites in EU Crackdown

    Data Privacy Week 2026-Interview

    Ad Fraud Is Exploding — Dhiraj Gupta of mFilterIt Explains How Brands Can Respond

    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    Data Privacy Week 2026

    Canada Marks Data Privacy Week 2026 as Commissioner Pushes for Privacy by Design

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber News

Black Basta Chat Logs Reveal Ransomware Group’s TTPs, IoCs

Paul Shread by Paul Shread
February 26, 2025
in Cyber News, Firewall Daily, Ransomware News
0
768
SHARES
4.3k
VIEWS
Share on LinkedInShare on Twitter

The Black Basta ransomware group has fallen off dramatically in 2025, and chat logs leaked recently show that internal squabbling may be behind the group’s slowed activity.

Cyble threat intelligence researchers documented 189 Black Basta victims in 2024. Nearly two months into 2025, that number has fallen to eight. Two weeks ago, a Telegram user who goes by ExploitWhispers leaked the group’s chat logs, which revealed infighting and disagreement over targets among Black Basta members.

What might be more useful, however, is an examination of what the chat logs tell us about Black Basta TTPs (tactics, techniques and procedures). So we queried a ChatGPT instance set up by security researchers to examine the Black Basta data, which includes nearly 200,000 chat messages sent between September 2023 and September 2024, to glean indicators of compromise (IoCs), TTPs and more.

The chat logs appear to include new information on the group beyond what had previously been reported by CISA and others, including newer vulnerabilities under discussion by group members.

Black Basta first appeared in April 2022, likely formed by former members of the Conti and REvil ransomware groups, and Cyble has since documented 528 victims of the group.

Black Basta TTPs Revealed by Leaked Chat Logs

According to the chat logs, Black Basta favors compromised remote access points for initial access, such as use of Remote Desktop Protocol (RDP) and VPN credentials.

report-ad-banner

Malicious scripts follow, including use of VBS (Visual Basic Script) files to execute malicious payloads​, and command execution via rundll32.exe, a common method for running DLL-based payloads​.

File names such as drs1312_signed.zip suggest the use of digitally signed executables to evade detection.

Numerous discussions about ESXi hypervisor vulnerabilities included mentions of systems allowing default passwords, and several leaked login credentials for various services suggest that the group employs credential stuffing, brute force, and/or phishing tactics​​.

Command and Control (C2) is established by SOCKS proxy servers and SSH command execution, with rotating domains for malware downloads and C2 communication​.

Black Basta also uses obfuscation and encryption techniques, with group members discussing antivirus (AV) evasion tactics, and files like e6393196-f020-4c2f-88fc-45ff7e22794f_encrypt_release_allsystem_x64.zip indicate whole-system encryption tactics​. Discussions also mentioned custom-built AV/EDR disablers, and Qakbot trojan evasion, injection and persistence mechanisms​.

The group used Cobalt Strike with multiple modifications, including a custom-built Artifact Kit for modifying Cobalt Strike payloads​, the Elevate Kit to integrate privilege escalation exploits​, the Sleep Mask Kit for memory obfuscation and AV evasion​, and the Mutator Kit to modify compiled binaries​. Mimikatz is another frequently used tool.

Members have also spoofed IT calls, posing as IT support to obtain access and bypass security​.

Vulnerabilities Targeted by Black Basta

The chat logs contain a long list of vulnerabilities under discussion by Black Basta members, ranging from Linux and Windows vulnerabilities to network devices, open source frameworks, IT tools and more, and in some cases the group appears to have chained vulnerabilities together.

Specific CVEs targeted by Black Basta include:

  • CVE-2022-30190: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution (RCE) vulnerability
  • CVE-2021-44228: The Log4j “Log4Shell” vulnerability
  • CVE-2022-22965: Spring Framework “Spring4Shell” vulnerability
  • CVE-2022-1388: F5 BIG-IP REST authentication vulnerability
  • CVE-2022-0609: Use after free vulnerability in Animation in Google Chrome
  • CVE-2017-11882: Microsoft Office memory corruption vulnerability
  • CVE-2022-41082 and CVE-2022-41040: the Microsoft Exchange “ProxyNotShell” vulnerabilities
  • CVE-2022-27925 and CVE-2022-41352: Zimbra Collaboration vulnerabilities that were used together to gain access and execute a reverse shell
  • CVE-2022-26134: Atlassian Confluence RCE vulnerability
  • CVE-2022-30525: Zyxel RCE vulnerability

More recent vulnerabilities under discussion by the group have included:

  • CVE-2024-21762: Fortinet FortiOS RCE
  • CVE-2024-3400: GlobalProtect RCE in Palo Alto Networks PAN-OS
  • CVE-2024-1709: ConnectWise ScreenConnect RCE
  • CVE-2024-26169: Windows Error Reporting Service elevation of privilege vulnerability
  • CVE-2024-23897: A Jenkins CI/CD pipeline vulnerability
  • CVE-2024-1086: A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component

Black Basta File Hashes and Indicators of Compromise (IoCs)

From ransomware files and malware samples to C2 IPs, domains, and compromised credentials, the chat logs also revealed a range of Black Basta indicators of compromise (IoCs).

Ransomware files include:

  • e6393196-f020-4c2f-88fc-45ff7e22794f_encrypt_release_allsystem_x64.zip
  • zip
  • CVE-2022-27925-zimbra_Revshell.zip (a backdoored Zimbra exploit)​

Black Basta has been associated with various malware families, including RemcosRAT, AgentTesla, FormBook, and GuLoader. File hashes from shared malware samples include:

  • Remcos RAT: c5793613219a782eb08205921a3f9ed97c2c74de18e0cd36008046d1a5e1288e
  • Agent Tesla: 50d414576bf441cca754e6e3b96dabdf35fed443ecb98f865dc89e623bc2f0e9
  • Formbook: e19dfc72ad2eea815ef6b4eb9b812471b3bb3cf40333d97e3c552c87db86e65a
  • GuLoader: 5a2f52bb90ed8a2fd9bc0e07937684ac9b9389cdd112760f8dc96e16aa63d513​

IP addresses used by the group for botnet communication, command-and-control (C2), and proxies have included:

  • 214.25.250
  • 8.18.230
  • 161.27.152
  • 98.80.158
  • 60.149.244
  • 227.252.244
  • 238.181.250
  • 118.36.203
  • 60.149.241
  • 165.16.55​
  • 57.243.97 (used for shell, SOCKS, FTP)​
  • 253.64.241 (used in UK-based attacks)​

The Biggest Ransomware Group Leak Since Conti

The Black Basta chat log leak is likely the biggest leak to hit a ransomware group since Black Basta predecessor Conti was hit by a source code leak in 2022.

So while the infighting is certainly entertaining and sheds light on the group’s dynamics, the many tactical details revealed provide a rich data source for threat intelligence researchers and security teams whose job is to stop and respond to threats from Black Basta and others who may adopt its tactics.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Black Bastablack basta ransomware groupcybersecurity newsRansomwareThe Cyber ExpressThe Cyber Express NewsThreat IntelligenceTTPsVulnerabilities
Previous Post

New EU Sanctions Blacklist Russian and North Korean Cyber Operatives

Next Post

Cyberattack on Australia’s Genea: Stolen Patient Data Hits the Dark Web

Next Post
Genea Cyberattack

Cyberattack on Australia’s Genea: Stolen Patient Data Hits the Dark Web

Upcoming Webinar

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Incognito Market
Cyber News

What the Incognito Market Sentencing Reveals About Dark Web Drug Trafficking

February 5, 2026
CISA Silently Updates Vulnerabilities Exploited by Ransomware Groups
Cyber News

CISA Silently Updates Vulnerabilities Exploited by Ransomware Groups

February 4, 2026
Ransomware Attacks 2026
Cyber News

Ransomware Attacks Have Soared 30% in Recent Months

February 4, 2026
Flock Safety ALPR cameras
Cyber News

Mountain View Shuts Down Flock Safety ALPR Cameras After Year-Long Unrestricted Data Access

February 4, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information