❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Black Basta’s playbook lives on as former affiliates launch fast-scale intrusion campaign

14 April 2026 at 12:25

A small group of former Black Basta affiliates have targeted more than 100 employees across dozens of organizations to intrude network systems for potential data theft, ransomware deployment and extortion, according to ReliaQuest.

The social engineering campaign, which involves mass email bombing and Microsoft Teams help desk impersonation, surged last month and dates back to at least May 2025, ReliaQuest said in a report Tuesday.Β 

Attackers have primarily targeted senior leadership to gain highly privileged access. β€œRoughly three-quarters of targeted users were executives, directors, managers or similarly high-value roles,” researchers who worked on the report told CyberScoop via email.Β 

Cybercriminals involved in Black Basta, an offshoot of Conti, scattered after the threat group’s internal chat logs leaked online in February 2025, providing threat researchers and authorities key details about the group’s operations.Β 

German police publicly identified Oleg Evgenievich Nefedov, a Russian national, as Black Basta’s alleged leader in January. Nefedov, a 35-year-old who was subsequently added to the most-wanted lists of Europol and Interpol, allegedly formed and ran Black Basta since 2022, authorities said.Β 

He is accused of extorting more than 100 companies in Germany and about 600 other countries globally.

ReliaQuest said the recently observed campaign shares many similarities with previous Black Basta activity and follows the same playbook β€” tooling, targeting and execution style β€” associated with the once-prolific ransomware group.Β 

β€œThat includes the repeated use of remote access tools, a strong concentration in sectors Black Basta historically favored, and a level of speed and coordination that suggests experienced operators are building on a playbook they already know works,” researchers said.Β 

β€œWe’re careful not to treat any one artifact as definitive proof, but taken together, the similarities are strong enough that we assess it is highly likely former affiliates or closely aligned operators are involved,” ReliaQuest researchers added.Β 

Black Basta’s data leak site was shut down shortly after its internal chats were leaked last year, but uncaptured cybercriminals typically scatter and join new groups in the wake of a takedown or disbandment. Threat hunters warned that former members were still actively targeting additional victims earlier this year.Β 

ReliaQuest released its report, including indicators of compromise, after it observed a particularly sharp spike in activity in March, noting that the group’s targeting was more focused on senior employees.

β€œThe operators are moving very quickly, with parts of the workflow becoming more automated or highly streamlined, which makes the campaign easier to scale and harder for defenders to interrupt before remote access is established,” researchers said.

The top-five sectors targeted in recent Black Basta-style attacks include manufacturing, professional services, finance and insurance, construction and technology, according to ReliaQuest.

Attackers typically bombard targeted employees with hundreds of emails within minutes and then contact targeted users, posing at IT support via direct messages on Microsoft Teams or a phone call. ReliaQuest said it’s observed some attackers achieve remote access minutes after the first sign of an email bomb.

Researchers did not say how many organizations have been successfully intruded as a result of this campaign thus far.Β 

While extortion appears to be the most likely objective, ReliaQuest cautioned against assuming every attack results in ransomware encryption.

β€œBased on what we’ve observed, the intrusion chain is built to gain access quickly, understand the environment, and create options for follow-on monetization,” researchers said. β€œThat could lead to data theft, extortion without encryption, or ransomware deployment, depending on the victim and the opportunity.”

The post Black Basta’s playbook lives on as former affiliates launch fast-scale intrusion campaign appeared first on CyberScoop.

Windows Maintenance Tool β€” β€œWorking on it …”

16 February 2026 at 03:45
ISSUE 23.07 β€’ 2026-02-16 FREEWARE SPOTLIGHT By Deanna McElveen Programs open a little slower. Your Internet browser takes a nap before loading a page. Updates say things like β€œWorking on it …” in the same tone as a teenager who is absolutely not β€œworking on it.” You know there are fixes for this. Things already […]

Stuff just shows up

3 November 2025 at 03:45
ISSUE 22.44 β€’ 2025-11-03 WINDOWS 11 By Will Fastie In theory, Microsoft’s modern lifecycle for Windows has new features showing up annually with the β€œH2” releases. In fact, features arrive pretty much whenever Microsoft wants. For consumers and IT admins alike, that makes it very hard to keep track of what should now be considered […]

How to Use CCAT: An Analysis Tool for Cisco Configuration Files

By: BHIS
4 November 2019 at 10:25

Kayla Mackiewicz // Last year, fellow tester Jordan Drysdale wrote a blog post about Cisco’s Smart Install feature. His blog post can be found here. If this feature is enabled […]

The post How to Use CCAT: An Analysis Tool for Cisco Configuration Files appeared first on Black Hills Information Security, Inc..

I Spy with InSpy v3.0

By: BHIS
28 January 2019 at 11:34

Darin Roberts// Early in 2018 I wrote a blog about InSpy. InSpy is a great reconnaissance tool that gathers usernames from LinkedIn. My first blog can be found here. A […]

The post I Spy with InSpy v3.0 appeared first on Black Hills Information Security, Inc..

I Spy with InSpy

By: BHIS
5 February 2018 at 10:33

Darin Roberts// Do you ever find yourself on an engagement and need just a few more names with which to conduct a password spray?Β Everyone knows the more emails you have, […]

The post I Spy with InSpy appeared first on Black Hills Information Security, Inc..

WEBCAST: CredDefense Toolkit

By: BHIS
4 October 2017 at 10:16

Beau Bullock, Brian Fehrman, & Derek Banks // Pentesting organizations as your day-to-day job quickly reveals commonalities among environments. Although each test is a bit unique, there’s a typical path […]

The post WEBCAST: CredDefense Toolkit appeared first on Black Hills Information Security, Inc..

HostRecon: A Situational Awareness Tool

By: BHIS
4 April 2017 at 10:04

Beau Bullock // Overview HostRecon is a tool I wrote in PowerShell to assist with quickly enumerating a number of items that I would typically check after gaining access to […]

The post HostRecon: A Situational Awareness Tool appeared first on Black Hills Information Security, Inc..

WEBCAST: RITA

By: BHIS
27 February 2017 at 11:54

John Strand // Want to get started on a hunt team and discover β€œbad things” on your network? In this webcast, we will walk through the installation and usage of […]

The post WEBCAST: RITA appeared first on Black Hills Information Security, Inc..

Domain Password Audit Tool

By: BHIS
1 December 2016 at 12:50

Carrie Roberts // A tool to generate password usage statics in a Windows domain based on hashes dumped from a domain controller. The Domain Password Audit Tool (DPAT) is a […]

The post Domain Password Audit Tool appeared first on Black Hills Information Security, Inc..

❌
❌