Somebody has uploaded Black Basta ransomware group’s internal chat server logs to the internet, so if you want to go read their chats about Capita and a host of victims who tried to cover up their breaches, now’s your chance.

https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-s-internal-chat-logs-leak-online/

Black Basta ransomware gang's internal chat logs leak online

An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation.

BleepingComputer
AI trained on Black Basta ransomware group messages: https://chatgpt.com/g/g-67b80f8b69f08191923d8e6c3fb929b6-blackbastagpt
ChatGPT - BlackBastaGPT

Helps researchers analyze Black Basta ransomware messages.

ChatGPT
When you kill a ransomware groups access by talking about a problem publicly:

There’s tons you can extract from there about ops, but one example.

There’s also great detail about the money laundering operation.

One thing I didn’t know, they launder via other victim orgs systems, and in some cases use bank accounts of other victims.

Based on the Black Basta chats I would say absolutely do not pay them if you’re a victim, particularly if you’re trying to avoid disclosure.

I’d also say they’re dead men walking in terms of being a ransomware group, they’ll probably try to continue but they are super operationally compromised so I don’t see how that’s sustainable.

☕️

Another one - Black Basta ransomware group compromising RDWeb (Remote Desktop Web Access, built into Windows Server) accounts and using them for lateral movement, and deploying webshells.

From what I recall RDWeb doesn't directly allow MFA on the actual portal, instead you have to put MFA on the bit behind (which is also a bit convoluted), so it looks like an open door.

I can't see anything on Google prior linking Black Basta to RDWeb.

Black Basta targeting corporate VPNs, lifting red team tools, using Brute Ratel (sold by a former CrowdStrike staff member) to evade CrowdStrike
Black Basta on social engineering
manipulating staff

There's some really good wins in there around how orgs and vendors disrupt Black Basta.

Take away = enable Microsoft SmartScreen, it's pretty clear Microsoft monitor Black Basta based on the chats so free prevention.

Examples:

The script for AnyDesk remote access, you might want to warn staff about these kind of prompts (but more importantly, block *.anydesk.com and similar).
I think there's finally a good use case for generative AI - ransomware group chat logs 🤪
Very little talk about video games by these guys, disappointing!

Not sure if anybody else caught this - back in June 2024, Symantec Threat Intel detailed a possible link between Black Basta using a Windows zero day. https://www.security.com/threat-intelligence/black-basta-ransomware-zero-day

In the leaked chat logs, they talk about the vulnerability - I've confirmed with technical details it's the same one. They purchase it as a zero day months before MS patched it, back in 2023.

Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day

Some evidence to suggest that attackers linked to Black Basta compiled CVE-2024-26169 exploit prior to patching.

The chat around it is in the evening of 20 November 2023 if anybody wants to pull the logs, you can see them using it post purchase for the first time on a live victim org.

It was how they were getting from standard users to local administrator on Windows systems, goes on for months as a zero day.

And this is why we need to dismantle the ransomware economy, victims paying is just fuelling better weapons.

More Black Basta having fun with zero days
Black Basta ransomware group is effectively dead, looks like.
Black Basta ransomware group is indeed dead, post hack and dump of their chats. #threatintel #ransomware
@GossiTheDog This bot has been asked to generate an alt text for your image by @klittle667. If you consent, your media will be uploaded to Google Gemini and might be used for training purposes. More information in my bio.
Do you consent? Reply with 'Y' or 'Yes' to proceed.
@GossiTheDog Meanwhile, I’m over here thinking I need to up my spelling and punctuation game. This reads like text from game play or something. It’s weird. Also, I don’t read a lot of (NB: any) ransomware operator logs normally.
@GossiTheDog holy fuck this is wild. We had some people try stuff like that over here but I caught it afaik 
@GossiTheDog The problem with dismantling the ransomware economy is that it actually means getting rid of cryptocurrencies, and people in high places don't want that.
https://32x33.institute/the-problem-with-pretend-money/
The problem with pretend money.

Hello, and welcome to the first post of 2025! I hope you had the chance to wind down and mentally prepare for what's next. Let's kick things off in style, and talk about cryptocurrencies. Right off the bat: ransomware only exists because cryptocurrencies are available and (mostly) freely traded. You

32x33 Institute
@GossiTheDog Maybe we should dismantle the trade of zero days first. Good luck with that, BTW.
@GossiTheDog Have you crosschecked the AI answers for correctness?

@GossiTheDog Haha someone already thought of that!

https://www.hudsonrock.com/blackbastagpt

ChatGPT - BlackBastaGPT

Helps researchers analyze Black Basta ransomware messages.

ChatGPT

@GossiTheDog Yeah, we detect any known remote desktop protocol and block it. Saves a lot of trouble.

Occasional complaints happen, but most are intelligent enough not to complain that things they're forbidden to use, don't work 🤪. Emphasis on "most".

@GossiTheDog

Those images desperately need #AltText. I can't make out a word on any of them. Have pity on older eyeballs looking at a cell phone. Please use #AltText whenever possible. Thanks.

@GossiTheDog This info is super interesting and also helpful, thank you:-)
@GossiTheDog Unfortunately, it will happen the same thing that happenned numerous times in the past, when a ransomware group is hit hard: they will either split in new groups, or go reinforce existing ones... :(

@GossiTheDog

Oh that's a sneaky option I hadn't thought of 🫤

@GossiTheDog I am curious which iOS app is that, I assume it is one which interfaces with a plans?
@GossiTheDog They use the RDP protocol for money laundering? I'd like to know more about this advanced technique...
@GossiTheDog wait, matrix chat should be e2ee so how can there be such logs?
@ketumbra @GossiTheDog Matrix had some significant problems in the past. I wouldn't count on bulletproof E2EE.
https://nebuchadnezzar-megolm.github.io/
Nebuchadnezzar

Practically-exploitable Cryptographic Vulnerabilities in Matrix
@GossiTheDog Kevin, did you download the logs? If so, would you mind if I shot you a DM asking a question about them.

@GossiTheDog The MEGA site is down, but the Telegram channel where this is being discussed provides a direct download of the chat contents via a ~50MB JSON file. Grepping for ZoomInfo URLs and using cut/sort/uniq can get folks a quick and dirty list of potentially targeted companies. Some of the company names I saw are listed on their ransom site, but some are attributed to other ransomware gangs. Some of the messages also have Forti/Cisco/Citrix as well as the $$$ amount after the ZoomInfo link for the company. Gonna guess this is likely the pwned appliance vendor and ransom amount for the company. One can likely walk back the vendor name to a critical RCE vulnerability which they exploited.

Grepping for CVEs, theres tons of chatter about various RCE vulnerabilities, mitigations, and PoC exploits. Same as Conti Leaks. I’m sure we’ll see a bunch of vendor write-ups in the coming days with Black Basta CTI analysis of the data.

#cti #threatintel #blackbasta

@GossiTheDog These GitHub repos were found in the dump. Free CTI threat hunting. Also, I noticed your GossiTheDog/scanning repo is included, you’re famous lol.

zer0condition/mhydeath
xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability?tab=readme-ov-file
willdurand/xpidump
wikiZ/RedGuard
watchtowrlabs/juniper-rce_cve-2023-36844
w0Tx/generate-ad-username
vulncheck-oss/cve-2023-36845-scanner
urbanadventurer/username-anarchy
trustedsec/CS-Situational-Awareness-BOF
threatexpress/random_c2_profile
threatexpress/malleable-c2
synacktiv/ica2tcp
sse-secure-systems/TeamsEnum
srlabs/black-basta-buster
skelsec/evilrdp
skelsec/aardwolf
shadofx/OpenVPNClient
rclone/rclone
rasta-mouse/SpawnWith
projectdiscovery/proxify
pld-linux/exim
p0dalirius/LDAPWordlistHarvester
outflanknl/C2-Tool-Collection
orgs/mandiant
openconnect/openconnect-gui
notselwyn/cve-2024-1086
netsecfish/dlink
nathan31337/Splunk-RCE-poc
mohinparamasivam/AD-Username-Generator
mohamedbenchikh/CVE-2022-27925
mlynchcogent/CVE-2023-4966-POC
mhaskar/DNSStager
mgeeky/ElusiveMice
matrix-org/synapse
klezVirus/CVE-2021-40444
kiwids0220/deviceCode2WinHello
keithmcintyre/blackbasta
kaluche/bloodhound-quickwin
ipSlav/DirtyCLR
ionuttbara/windows-defender-remover`
ionuttbara/windows-defender-remover
icyguider/UAC-BOF-Bonanza`
horizon3ai/CVE-2024-23108
hitanxxx/tiny-AES-c
hitanxxx/lk_socks5
h4x0r-dz/CVE-2024-23897
georgesotiriadis/Chimera
gentilkiwi/mimikatz
gatariee/Winton
garrettfoster13/sccmhunter
fortra/impacket.git
fortra/impacket
floesen/EventLogCrasher
fin3ss3g0d/secretsdump.py
evilmog/ntlmv1-multi
eversinc33/Banshee
es3n1n/no-defender
eladshamir/Internal-Monologue
eclypsium/Screwed-Drivers
duy-31/CVE-2024-21413
drb-ra/C2IntelFeeds
dirkjanm/ROADtools
crocodyli/ThreatActors-TTPs
c3c/ADExplorerSnapshot.py.git
burrowers/garble
assetnote/exploits
asmtlab/snafflepy
amidaware/tacticalrmm
adium/adium
ZephrFish/Cisco-IOS-XE-Scanner
XiaoliChan/zerologon-Shot
WKL-Sec/GregsBestFriend
Vozec/CVE-2024-23897
Vozec/CVE-2023-7028
V-i-x-x/AMSI-BYPASS
UlyssesSaicha/CVE-2023-6875
SkyEmie/batch-obfuscator
SafeBreach-Labs/PoolParty
Roman1us?tab=repositories
RedSiege/GraphStrike
RalfHacker/Kerbeus-BOF
RCStep/CSSG`
R3dy/capsulecorp-pentest
ProcessusT/Venoma
Pennyw0rth/NetExec
Octoberfest7/TeamsPhisher
OG-Sadpanda/SharpZippo
N1k0la-T/CVE-2023-36745
MaorSabag/TrueSightKiller
Maldev-Academy/Christmas
Krypteria/AtlasLdr
Kevin-Robertson/Powermad
Idov31/Nidhogg
GossiTheDog/scanning
Flangvik/ObfuscatedSharpCollection
Exim/exim
EntySec/SeaShell?tab=readme-ov-file
D00Movenok/BounceBack
CiscoCXSecurity/udp-proto-scanner
Chocapikk/CVE-2024-3400
Chocapikk/CVE-2023-29357
CaledoniaProject/drivers-binaries
BlackSnufkin/GhostDriver
BishopFox/cve-2024-21762-check
Apr4h/CobaltStrikeScan
AgeloVito/PoolPartyBof
0xEr3bus/PoolPartyBof

#cti #threatintel #BlackBasta

@saltmyhash @GossiTheDog link to the telegram channel or the json?
@GossiTheDog smart use of and LLM btw 👍