Takes Aim at the Ransomware Throne
In February 2025, BlackBasta ransomware operations ceased after their internal chat logs were leaked online, leading to disbandment. However, former affiliates continued launching attacks using different ransomware families, including the relatively unknown Payouts King group that emerged in April 2025. ThreatLabz has observed continued ransomware activity consistent with former BlackBasta initial access brokers since early 2026, utilizing similar tactics including spam bombing, Microsoft Teams phishing, and Quick Assist abuse. Payouts King implements sophisticated evasion techniques including stack-based string obfuscation, API hashing, and direct system calls to terminate security processes. The ransomware leverages 4,096-bit RSA and 256-bit AES counter mode encryption, selectively encrypting files while targeting security software and employing anti-forensics techniques like shadow copy deletion and event log clearing.
Pulse ID: 69e1f1296b63ec46a94782ce
Pulse Link: https://otx.alienvault.com/pulse/69e1f1296b63ec46a94782ce
Pulse Author: AlienVault
Created: 2026-04-17 08:36:57
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #Encryption #ICS #InfoSec #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #Spam #ThreatLabz #bot #AlienVault