cyberplace.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Cybersecurity, fandom, video games, technology, dog photos and most importantly, you.

Server stats:

951
active users

Somebody has uploaded Black Basta ransomware group’s internal chat server logs to the internet, so if you want to go read their chats about Capita and a host of victims who tried to cover up their breaches, now’s your chance.

bleepingcomputer.com/news/secu

BleepingComputer · Black Basta ransomware gang's internal chat logs leak online
More from Sergiu Gatlan

When you kill a ransomware groups access by talking about a problem publicly:

There’s tons you can extract from there about ops, but one example.

There’s also great detail about the money laundering operation.

One thing I didn’t know, they launder via other victim orgs systems, and in some cases use bank accounts of other victims.

Based on the Black Basta chats I would say absolutely do not pay them if you’re a victim, particularly if you’re trying to avoid disclosure.

I’d also say they’re dead men walking in terms of being a ransomware group, they’ll probably try to continue but they are super operationally compromised so I don’t see how that’s sustainable.

Another one - Black Basta ransomware group compromising RDWeb (Remote Desktop Web Access, built into Windows Server) accounts and using them for lateral movement, and deploying webshells.

From what I recall RDWeb doesn't directly allow MFA on the actual portal, instead you have to put MFA on the bit behind (which is also a bit convoluted), so it looks like an open door.

I can't see anything on Google prior linking Black Basta to RDWeb.

Black Basta targeting corporate VPNs, lifting red team tools, using Brute Ratel (sold by a former CrowdStrike staff member) to evade CrowdStrike

Black Basta on social engineering

There's some really good wins in there around how orgs and vendors disrupt Black Basta.

Take away = enable Microsoft SmartScreen, it's pretty clear Microsoft monitor Black Basta based on the chats so free prevention.

Examples:

The script for AnyDesk remote access, you might want to warn staff about these kind of prompts (but more importantly, block *.anydesk.com and similar).

I think there's finally a good use case for generative AI - ransomware group chat logs 🤪

Very little talk about video games by these guys, disappointing!

Not sure if anybody else caught this - back in June 2024, Symantec Threat Intel detailed a possible link between Black Basta using a Windows zero day. security.com/threat-intelligen

In the leaked chat logs, they talk about the vulnerability - I've confirmed with technical details it's the same one. They purchase it as a zero day months before MS patched it, back in 2023.

The chat around it is in the evening of 20 November 2023 if anybody wants to pull the logs, you can see them using it post purchase for the first time on a live victim org.

It was how they were getting from standard users to local administrator on Windows systems, goes on for months as a zero day.

And this is why we need to dismantle the ransomware economy, victims paying is just fuelling better weapons.

More Black Basta having fun with zero days

Black Basta ransomware group is effectively dead, looks like.

Black Basta ransomware group is indeed dead, post hack and dump of their chats.

@GossiTheDog Yeah, we detect any known remote desktop protocol and block it. Saves a lot of trouble.

Occasional complaints happen, but most are intelligent enough not to complain that things they're forbidden to use, don't work 🤪. Emphasis on "most".

@GossiTheDog Have you crosschecked the AI answers for correctness?

@GossiTheDog must be a lonely existence for cameron777

@GossiTheDog This bot has been asked to generate an alt text for your image by @klittle667. If you consent, your media will be uploaded to Google Gemini and might be used for training purposes. More information in my bio.
Do you consent? Reply with 'Y' or 'Yes' to proceed.

@GossiTheDog Meanwhile, I’m over here thinking I need to up my spelling and punctuation game. This reads like text from game play or something. It’s weird. Also, I don’t read a lot of (NB: any) ransomware operator logs normally.

@GossiTheDog what marketing form have they engaged for their rebranding exercise?

@GossiTheDog holy fuck this is wild. We had some people try stuff like that over here but I caught it afaik :blobPikaSigh:

@GossiTheDog Maybe we should dismantle the trade of zero days first. Good luck with that, BTW.

@GossiTheDog

Those images desperately need #AltText. I can't make out a word on any of them. Have pity on older eyeballs looking at a cell phone. Please use #AltText whenever possible. Thanks.