News: 1740142565

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Experts race to extract intel from Black Basta internal chat leaks

(2025/02/21)


Hundreds of thousands of internal messages from the Black Basta ransomware gang were leaked by a Telegram user, prompting security researchers to bust out their best Russian translations post haste.

A user going by the name "ExploitWhispers" uploaded the chats in the form of a JSON file nearly 50MB in size to Mega, which has since removed the download link.

Alas, the cyber threat intelligence (CTI) community flocked to the rare trove of information to glean any and all insights they could. The problem: It's all in Russian, so translating every message and turning that into actionable intel will take some time.

[1]

The threat intelligence team at PRODAFT said on Thursday that the chats, which were leaked on February 11, followed an internal conflict largely driven by a single figure within the organization.

[2]

[3]

"As part of our continuous monitoring, we've observed that Black Basta (Vengeful Mantis) has been mostly inactive since the start of the year due to internal conflicts," it [4]said . "Some of its operators scammed victims by collecting ransom payments without providing functional decryptors.

"The internal conflict was driven by 'Tramp' (LARVA-18), a known threat actor who operates a spamming network responsible for distributing Qbot. As a key figure within Black Basta, his actions played a major role in the group's instability.

[5]

"On February 11, 2025, a major leak exposed Black Basta internal Matrix chat logs. The leaker claimed they released the data because the group was targeting Russian banks. This leak closely resembles the previous Conti leaks."

A list of highlights from the chats so far, curated from posts made across the CTI community, can be found below:

Ransom demands went deep into the tens of millions, according to one December 2023 [6]ransom note

The group was charging around $1 million for a year's access to its loader

One affiliate [7]is a child aged 17 years

Black Basta goes to great lengths to [8]procure VPN exploits

It also maintains a spreadsheet of potential victims it wishes to target, which are not selected at random

After seeing Scattered Spider's success with social engineering, its affiliates adopted similar techniques and used phone calls to make initial contact with company personnel

Key gang members did not trust "Mr LockBit"

It was known within the group that its ransomware was less effective than rivals, which drove some affiliates to join Cactus ransomware instead

One PRODAFT CTI analyst also [9]broke down the main figures within the group, claiming a character they named as "Tramp" was likely the leader of the gang.

He and Bio used to work together at Conti, which also suffered a similar infamous [10]internal chat leak in 2022, the researchers believe.

Lapa is one of the main administrators of the group, but appears to be paid markedly less than other senior members and is frequently insulted by his boss.

[11]

YY is another main admin and makes "a good salary," although the chats don't list specific figures. Under the watch of Lapa and YY, the group attacked Russian banks which is thought to have brought significant heat on the group from domestic law enforcement.

The nicknames were linked to what were described as the crims' "real names," although we've no way of knowing whether these are aliases.

[12]Ransomware scum make it personal for Reg readers by impersonating tech support

[13]Microsoft says more ransomware stopped before reaching encryption

[14]Russia’s FIN7 is peddling its EDR-nerfing malware to ransomware gangs

[15]Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware

Cortes is part of the [16]Qakbot operation, which often works alongside Black Basta, but distanced himself from the ransomware crew following the attacks on Russian banks. It's understandable, given that Russia generally turns a blind eye to cybercrime unless it targets organizations within Putinland.

The leaked messages span September 18, 2023, to September 28, 2024. The Register has not yet reviewed the chats in full, but the date ranges suggest intelligence related to many high-profile attacks could be hiding among them. They include:

The UK's [17]Southern Water

Healthcare company Synlab Italia

US Catholic healthcare network [18]Ascension

Jet engine dealer [19]Willis Lease Finance

Belgian beer slinger [20]Duvel Moortgat

Hyundai Europe

Veolia North America

Government of Chile's customs department

Toronto Public Library

Black Basta was [21]known for targeting critical national infrastructure organizations, so the fact that so many feature in the list, and that researchers confirmed its "hit list" spreadsheet was not an opportunistic one, does not come as a surprise.

And for anyone wanting to scour the records themselves, the folks over at Hudson Rock have been quick to create what they're calling [22]BlackBastaGPT – an interactive ChatGPT-powered tool allowing researchers to uncover details from the chats. ®

Get our [23]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[4] https://x.com/PRODAFT/status/1892636346885235092

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://x.com/ddd1ms/status/1892688170073927906

[7] https://x.com/RussianPanda9xx/status/1892790458826318110

[8] https://x.com/vxunderground/status/1892830063365697685

[9] https://x.com/3xp0rtblog/status/1892583537879994632

[10] https://www.theregister.com/2022/03/11/conti_leaks_code/

[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[12] https://www.theregister.com/2025/01/22/ransomware_crews_abuse_microsoft_teams/

[13] https://www.theregister.com/2024/10/15/microsoft_ransomware_attacks/

[14] https://www.theregister.com/2024/07/18/russias_fin7_is_peddling_its/

[15] https://www.theregister.com/2024/05/16/microsoft_quick_assist_crime/

[16] https://www.theregister.com/2023/12/19/qakbot_returns/

[17] https://www.theregister.com/2024/01/23/southern_water_confirms_cyberattack/

[18] https://www.theregister.com/2024/05/09/us_faithbased_healthcare_org_ascension/

[19] https://www.theregister.com/2024/02/12/jet_engine_dealer_to_major/

[20] https://www.theregister.com/2024/03/07/no_piss_up_in_duvels/

[21] https://www.theregister.com/2024/05/13/cisa_ascension_ransomware/

[22] https://chatgpt.com/g/g-67b80f8b69f08191923d8e6c3fb929b6-blackbastagpt

[23] https://whitepapers.theregister.com/



Black Bastard?

Anonymous Coward

Black Bastard? Funny

Re: Black Bastard?

m4r35n357

Do you think they have a CoC? ;)

"...known for targeting critical national infrastructure organizations"

Roj Blake

National infrastructure doesn't get much more critical than Duvel!

This has been planned for some time. I guess we'll just have to find
someone with an exceptionally round tuit.
-- Larry Wall in <199709302338.QAA17037@wall.org>