Experts race to extract intel from Black Basta internal chat leaks
(2025/02/21)
- Reference: 1740142565
- News link: https://www.theregister.co.uk/2025/02/21/experts_race_to_extract_intel/
- Source link:
Hundreds of thousands of internal messages from the Black Basta ransomware gang were leaked by a Telegram user, prompting security researchers to bust out their best Russian translations post haste.
A user going by the name "ExploitWhispers" uploaded the chats in the form of a JSON file nearly 50MB in size to Mega, which has since removed the download link.
Alas, the cyber threat intelligence (CTI) community flocked to the rare trove of information to glean any and all insights they could. The problem: It's all in Russian, so translating every message and turning that into actionable intel will take some time.
[1]
The threat intelligence team at PRODAFT said on Thursday that the chats, which were leaked on February 11, followed an internal conflict largely driven by a single figure within the organization.
[2]
[3]
"As part of our continuous monitoring, we've observed that Black Basta (Vengeful Mantis) has been mostly inactive since the start of the year due to internal conflicts," it [4]said . "Some of its operators scammed victims by collecting ransom payments without providing functional decryptors.
"The internal conflict was driven by 'Tramp' (LARVA-18), a known threat actor who operates a spamming network responsible for distributing Qbot. As a key figure within Black Basta, his actions played a major role in the group's instability.
[5]
"On February 11, 2025, a major leak exposed Black Basta internal Matrix chat logs. The leaker claimed they released the data because the group was targeting Russian banks. This leak closely resembles the previous Conti leaks."
A list of highlights from the chats so far, curated from posts made across the CTI community, can be found below:
Ransom demands went deep into the tens of millions, according to one December 2023 [6]ransom note
The group was charging around $1 million for a year's access to its loader
One affiliate [7]is a child aged 17 years
Black Basta goes to great lengths to [8]procure VPN exploits
It also maintains a spreadsheet of potential victims it wishes to target, which are not selected at random
After seeing Scattered Spider's success with social engineering, its affiliates adopted similar techniques and used phone calls to make initial contact with company personnel
Key gang members did not trust "Mr LockBit"
It was known within the group that its ransomware was less effective than rivals, which drove some affiliates to join Cactus ransomware instead
One PRODAFT CTI analyst also [9]broke down the main figures within the group, claiming a character they named as "Tramp" was likely the leader of the gang.
He and Bio used to work together at Conti, which also suffered a similar infamous [10]internal chat leak in 2022, the researchers believe.
Lapa is one of the main administrators of the group, but appears to be paid markedly less than other senior members and is frequently insulted by his boss.
[11]
YY is another main admin and makes "a good salary," although the chats don't list specific figures. Under the watch of Lapa and YY, the group attacked Russian banks which is thought to have brought significant heat on the group from domestic law enforcement.
The nicknames were linked to what were described as the crims' "real names," although we've no way of knowing whether these are aliases.
[12]Ransomware scum make it personal for Reg readers by impersonating tech support
[13]Microsoft says more ransomware stopped before reaching encryption
[14]Russia’s FIN7 is peddling its EDR-nerfing malware to ransomware gangs
[15]Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware
Cortes is part of the [16]Qakbot operation, which often works alongside Black Basta, but distanced himself from the ransomware crew following the attacks on Russian banks. It's understandable, given that Russia generally turns a blind eye to cybercrime unless it targets organizations within Putinland.
The leaked messages span September 18, 2023, to September 28, 2024. The Register has not yet reviewed the chats in full, but the date ranges suggest intelligence related to many high-profile attacks could be hiding among them. They include:
The UK's [17]Southern Water
Healthcare company Synlab Italia
US Catholic healthcare network [18]Ascension
Jet engine dealer [19]Willis Lease Finance
Belgian beer slinger [20]Duvel Moortgat
Hyundai Europe
Veolia North America
Government of Chile's customs department
Toronto Public Library
Black Basta was [21]known for targeting critical national infrastructure organizations, so the fact that so many feature in the list, and that researchers confirmed its "hit list" spreadsheet was not an opportunistic one, does not come as a surprise.
And for anyone wanting to scour the records themselves, the folks over at Hudson Rock have been quick to create what they're calling [22]BlackBastaGPT – an interactive ChatGPT-powered tool allowing researchers to uncover details from the chats. ®
Get our [23]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[4] https://x.com/PRODAFT/status/1892636346885235092
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://x.com/ddd1ms/status/1892688170073927906
[7] https://x.com/RussianPanda9xx/status/1892790458826318110
[8] https://x.com/vxunderground/status/1892830063365697685
[9] https://x.com/3xp0rtblog/status/1892583537879994632
[10] https://www.theregister.com/2022/03/11/conti_leaks_code/
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[12] https://www.theregister.com/2025/01/22/ransomware_crews_abuse_microsoft_teams/
[13] https://www.theregister.com/2024/10/15/microsoft_ransomware_attacks/
[14] https://www.theregister.com/2024/07/18/russias_fin7_is_peddling_its/
[15] https://www.theregister.com/2024/05/16/microsoft_quick_assist_crime/
[16] https://www.theregister.com/2023/12/19/qakbot_returns/
[17] https://www.theregister.com/2024/01/23/southern_water_confirms_cyberattack/
[18] https://www.theregister.com/2024/05/09/us_faithbased_healthcare_org_ascension/
[19] https://www.theregister.com/2024/02/12/jet_engine_dealer_to_major/
[20] https://www.theregister.com/2024/03/07/no_piss_up_in_duvels/
[21] https://www.theregister.com/2024/05/13/cisa_ascension_ransomware/
[22] https://chatgpt.com/g/g-67b80f8b69f08191923d8e6c3fb929b6-blackbastagpt
[23] https://whitepapers.theregister.com/
A user going by the name "ExploitWhispers" uploaded the chats in the form of a JSON file nearly 50MB in size to Mega, which has since removed the download link.
Alas, the cyber threat intelligence (CTI) community flocked to the rare trove of information to glean any and all insights they could. The problem: It's all in Russian, so translating every message and turning that into actionable intel will take some time.
[1]
The threat intelligence team at PRODAFT said on Thursday that the chats, which were leaked on February 11, followed an internal conflict largely driven by a single figure within the organization.
[2]
[3]
"As part of our continuous monitoring, we've observed that Black Basta (Vengeful Mantis) has been mostly inactive since the start of the year due to internal conflicts," it [4]said . "Some of its operators scammed victims by collecting ransom payments without providing functional decryptors.
"The internal conflict was driven by 'Tramp' (LARVA-18), a known threat actor who operates a spamming network responsible for distributing Qbot. As a key figure within Black Basta, his actions played a major role in the group's instability.
[5]
"On February 11, 2025, a major leak exposed Black Basta internal Matrix chat logs. The leaker claimed they released the data because the group was targeting Russian banks. This leak closely resembles the previous Conti leaks."
A list of highlights from the chats so far, curated from posts made across the CTI community, can be found below:
Ransom demands went deep into the tens of millions, according to one December 2023 [6]ransom note
The group was charging around $1 million for a year's access to its loader
One affiliate [7]is a child aged 17 years
Black Basta goes to great lengths to [8]procure VPN exploits
It also maintains a spreadsheet of potential victims it wishes to target, which are not selected at random
After seeing Scattered Spider's success with social engineering, its affiliates adopted similar techniques and used phone calls to make initial contact with company personnel
Key gang members did not trust "Mr LockBit"
It was known within the group that its ransomware was less effective than rivals, which drove some affiliates to join Cactus ransomware instead
One PRODAFT CTI analyst also [9]broke down the main figures within the group, claiming a character they named as "Tramp" was likely the leader of the gang.
He and Bio used to work together at Conti, which also suffered a similar infamous [10]internal chat leak in 2022, the researchers believe.
Lapa is one of the main administrators of the group, but appears to be paid markedly less than other senior members and is frequently insulted by his boss.
[11]
YY is another main admin and makes "a good salary," although the chats don't list specific figures. Under the watch of Lapa and YY, the group attacked Russian banks which is thought to have brought significant heat on the group from domestic law enforcement.
The nicknames were linked to what were described as the crims' "real names," although we've no way of knowing whether these are aliases.
[12]Ransomware scum make it personal for Reg readers by impersonating tech support
[13]Microsoft says more ransomware stopped before reaching encryption
[14]Russia’s FIN7 is peddling its EDR-nerfing malware to ransomware gangs
[15]Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware
Cortes is part of the [16]Qakbot operation, which often works alongside Black Basta, but distanced himself from the ransomware crew following the attacks on Russian banks. It's understandable, given that Russia generally turns a blind eye to cybercrime unless it targets organizations within Putinland.
The leaked messages span September 18, 2023, to September 28, 2024. The Register has not yet reviewed the chats in full, but the date ranges suggest intelligence related to many high-profile attacks could be hiding among them. They include:
The UK's [17]Southern Water
Healthcare company Synlab Italia
US Catholic healthcare network [18]Ascension
Jet engine dealer [19]Willis Lease Finance
Belgian beer slinger [20]Duvel Moortgat
Hyundai Europe
Veolia North America
Government of Chile's customs department
Toronto Public Library
Black Basta was [21]known for targeting critical national infrastructure organizations, so the fact that so many feature in the list, and that researchers confirmed its "hit list" spreadsheet was not an opportunistic one, does not come as a surprise.
And for anyone wanting to scour the records themselves, the folks over at Hudson Rock have been quick to create what they're calling [22]BlackBastaGPT – an interactive ChatGPT-powered tool allowing researchers to uncover details from the chats. ®
Get our [23]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[4] https://x.com/PRODAFT/status/1892636346885235092
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://x.com/ddd1ms/status/1892688170073927906
[7] https://x.com/RussianPanda9xx/status/1892790458826318110
[8] https://x.com/vxunderground/status/1892830063365697685
[9] https://x.com/3xp0rtblog/status/1892583537879994632
[10] https://www.theregister.com/2022/03/11/conti_leaks_code/
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z7ixMnKFsntpXb-3spxkJAAAAMQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[12] https://www.theregister.com/2025/01/22/ransomware_crews_abuse_microsoft_teams/
[13] https://www.theregister.com/2024/10/15/microsoft_ransomware_attacks/
[14] https://www.theregister.com/2024/07/18/russias_fin7_is_peddling_its/
[15] https://www.theregister.com/2024/05/16/microsoft_quick_assist_crime/
[16] https://www.theregister.com/2023/12/19/qakbot_returns/
[17] https://www.theregister.com/2024/01/23/southern_water_confirms_cyberattack/
[18] https://www.theregister.com/2024/05/09/us_faithbased_healthcare_org_ascension/
[19] https://www.theregister.com/2024/02/12/jet_engine_dealer_to_major/
[20] https://www.theregister.com/2024/03/07/no_piss_up_in_duvels/
[21] https://www.theregister.com/2024/05/13/cisa_ascension_ransomware/
[22] https://chatgpt.com/g/g-67b80f8b69f08191923d8e6c3fb929b6-blackbastagpt
[23] https://whitepapers.theregister.com/
Re: Black Bastard?
m4r35n357
Do you think they have a CoC? ;)
"...known for targeting critical national infrastructure organizations"
Roj Blake
National infrastructure doesn't get much more critical than Duvel!
Black Bastard?
Black Bastard? Funny