TechCrunch News 02月21日
A huge trove of leaked Black Basta chat logs expose the ransomware gang’s key members and victims
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Black Basta勒索软件团伙的聊天记录泄露,揭露了这个与俄罗斯有关联的团伙的关键成员。超过20万条消息的聊天记录显示,该团伙内部存在冲突,原因是部分成员未能向支付赎金的受害者提供可用的解密工具。泄露的信息包括该团伙未公开的目标、使用的网络钓鱼模板、漏洞利用方式、加密货币地址以及勒索谈判的细节。聊天记录还显示,该团伙利用Zoominfo收集公司信息,并讨论了针对Fisker、Cerner Corp和Hotelplan等公司的攻击。该团伙还吹嘘能够利用Citrix、Ivanti、Palo Alto Networks和Fortinet软件中的漏洞进行网络攻击。此外,该团伙成员还担心因地缘政治压力而受到俄罗斯当局的调查。

🇷🇺Black Basta是一个与俄罗斯有关联的勒索软件团伙,其聊天记录泄露暴露了该团伙的内部运作和关键成员,包括主要管理员“YY”、关键领导人“Lapa”、与Qakbot僵尸网络有关联的黑客“Cortes”以及化名“Trump”的Oleg Nefedovaka,后者被认为是该团伙的主要头目。

🎯泄露的聊天记录揭示了Black Basta的攻击目标,包括美国医疗机构Ascension、英国公用事业公司Southern Water和英国外包巨头Capita等已公开的受害者,以及未公开的目标,如美国汽车巨头Fisker、健康科技供应商Cerner Corp和英国旅游公司Hotelplan。

🔑聊天记录还提供了关于Black Basta如何进行网络攻击的详细信息,包括利用Zoominfo收集目标公司信息、使用网络钓鱼模板、利用Citrix、Ivanti、Palo Alto Networks和Fortinet软件中的漏洞等。

A trove of chat logs allegedly belonging to the Black Basta ransomware group has leaked online, exposing key members of the prolific Russia-linked gang. 

The chatlogs, which include over 200,000 messages spanning from September 18, 2023, to September 28, 2024, were shared with threat intelligence company Prodaft by a leaker. The cybersecurity firm says the leak comes amid “internal conflict” within the Black Basta group after some members allegedly failed to provide its victims with functional decryption tools despite paying a ransom demand.

It’s not yet known if the leaker, who uses the alias “ExploitWhispers” on Telegram, was a member of the Black Basta gang. 

Black Basta is a prolific Russian-language ransomware gang, which the U.S. government has linked to hundreds of attacks on critical infrastructure and global businesses, whose publicly known victims include U.S. healthcare organization Ascension, U.K. utility company Southern Water, and British outsourcing giant Capita. The leaked chat logs give a never-before-seen look inside the ransomware gang, including some of its unreported targets.

According to a post on X by Prodaft, the leaker said that the hackers “crossed the line” by targeting Russian domestic banks.

“So we are dedicated to uncovering the truth and investigating Black Basta’s next steps,” the leaker wrote.

TechCrunch obtained a copy of the hackers’ chat logs from Prodaft, which contain details about key members of the ransomware gang. 

These members include “YY” (Black Basta’s main administrator); “Lapa” (another of Black Basta’s key leaders); “Cortes” (a hacker linked to the Qakbot botnet); and “Trump” (also known as “AA” and “GG”).

The hacker “Trump” is believed to be an alias used by Oleg Nefedovaka, who Prodaft researchers describe as “the group’s main boss.” The researchers linked Nefedovaka to the now-defunct Conti ransomware group, which shut down soon after its internal chat logs leaked following the gang declaring its support for Russia’s full-scale invasion of Ukraine in 2022.

The leaked Black Basta chat logs also quote one member as saying they are 17-years-old, TechCrunch has seen. 

By our count, the leaked chats contain 380 unique links related to company information hosted on Zoominfo, a data broker that collects and sells access to businesses and their employees, which the chatlogs show the hackers used to research the companies they targeted. The links also give some indication of the number of organizations targeted by the gang during the 12-month period. 

The chat logs also reveal unprecedented insights into the group’s operations. The messages include details on Black Basta’s victims, copies of phishing templates used in their cyberattacks, some of the exploits used by the gang, cryptocurrency addresses associated with ransom payments, and details about ransom demands and victims’ negotiations with hacked organizations. 

We also found chat logs of the hackers discussing a TechCrunch article about ongoing Qakbot activity, despite an earlier FBI takedown operation aimed at knocking the notorious botnet offline.

TechCrunch also found chat logs that named several previously unknown targeted organizations. This includes the failed U.S. automotive giant Fisker; healthtech provider Cerner Corp, which is now owned by Oracle; and U.K.-based travel firm Hotelplan. It is not yet known if the companies were breached, and none of the companies responded to TechCrunch’s inquiries.

The chat logs appear to show the gang’s efforts in exploiting security bugs in enterprise network devices, such as routers and firewalls that sit on the perimeter of a company’s network and act as digital gatekeepers. 

The hackers boasted their ability to exploit vulnerabilities in Citrix remote access products to break into at least two company networks. The gang also talked about exploiting vulnerabilities in Ivanti, Palo Alto Networks and Fortinet software to carry out cyberattacks. 

A conversation between Black Basta members also suggests that some of the group were worried about being investigated by Russian authorities in response to geopolitical pressures. While Russia has long been a safe haven for ransomware gangs, Black Basta was also concerned about actions brought by the U.S. government. 

Messages sent after the group’s breach of Ascension’s systems warned that the FBI and CISA are “100% obliged” to get involved and could lead to the agencies “taking a tough stance on Black Basta.”

Black Basta’s dark web leak site, which it uses to publicly extort victims into paying the gang a ransom demand, was offline at the time of publication. 

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Black Basta 勒索软件 网络安全 数据泄露
相关文章