Skip Navigation

March 21, 2025 |

Leaked Black Basta chat reveals possible connection with Russian authorities

Loading table of contents...

A recent leak of over 200,000 chat messages exchanged between members of Black Basta ransomware group, spanning September 2023 to September 2024, has unveiled new details on the group’s operations. The chat logs have also revealed potential connections between the cybercriminal organization and Russian authorities.

The chats, which were released on Telegram for anyone to read, suggest that Black Basta's alleged leader, Oleg Nefedov (also known as GG or AA), received assistance from high-ranking Russian officials to escape from Armenia following his arrest in June 2024.

The leaked communications also reveal that Black Basta operates out of two offices in Moscow, and uses OpenAI's ChatGPT for various tasks, including drafting fraudulent letters, rewriting malware code, debugging, and gathering victim information. Additionally, there are indications of overlap between Black Basta members and other ransomware groups like Rhysida and CACTUS.

ThreatRoundUp_SignUp_Simplifiedx2

Stay on top of emerging threats.

Sign up to receive a weekly roundup of our security intelligence feed. You'll be the first to know of emerging attack vectors, threats, and vulnerabilities. 

Sign up

The leaked logs reveal current developments the group is working on, such as a new malware loader, called PikaBot, and a post-exploitation command-and-control framework, called Breaker, to maintain persistent and undetected access within compromised networks. The group is also working on new ransomware derived from Conti's source code, with a prototype written in C, indicating possible rebranding efforts.

Finally, the logs showed that Black Basta has invested in a brute-forcing framework named BRUTED, designed to automate internet scanning and credential-stuffing attacks against edge network devices, including widely used firewalls and VPN solutions in corporate environments. This tool enables the group to conduct large-scale attacks efficiently, expanding their victim pool and accelerating their ransomware operations.

Source: The Hacker News

Analysis

Oleg Nefedov, alleged leader of the Black Basta ransomware group, was arrested in Yerevan, Armenia, on June 21, 2024. He was detained for only 72 hours, however, authorities failed to secure a timely detention order, leading to his release and subsequent escape from the country which the chat logs reveal may have been facilitated by Russian authorities.;

Russia’s facilitation of Nefedov’s escape isn’t surprising. There have been instances where Russian authorities have been implicated in assisting or turning a blind eye to cybercriminal activities, particularly when these align with state interests. A notable example is Alexsey Belan, a Latvian-born hacker accused of multiple cybercrimes, including the massive Yahoo data breach. Belan was detained in Greece at the request of U.S. authorities but was released on bail and subsequently fled to Russia. Despite being on the FBI's Most Wanted list, he remained at large, with Russian officials unwilling to extradite him.

The leaked chat logs provide unprecedented insight into Black Basta's internal operations, strategies, and collaborations, highlighting the sophisticated and organized nature of a modern cybercriminal enterprise. Even more revelations are likely to come as researchers dig further into the chat logs.

Mitigation

Field Effect’s Security Intelligence professionals constantly monitor the cyber threat landscape for ransomware-related threats. Field Effect MDR users are automatically notified if ransomware is detected in their environment and are encouraged to review these AROs as quickly as possible via the Field Effect Portal.

While defending against ransomware attacks may seem intimidating, even a few simple, easy-to-implement best practices can help prevent attacks. Field Effect recommends that organizations adopt the following best practices:

Backup your data

Regular backups of sensitive and important information can help ensure business continuity during a ransomware attack. These backups should be stored somewhere different than the operational network so that they will not be encrypted during an attack and, thus, can be used to restore devices.

Update and patch software

Regular patching, updating, and maintenance help protect against or eliminate known cybersecurity vulnerabilities in IT systems. This is one of the most important steps you can take to improve your security.

Protect systems connected to the internet

Using a DNS firewall limits access to known malicious websites, helping to defend against potential social engineering attacks while blocking malicious code and securing access to cloud apps and corporate websites. Leveraging a virtual private network (VPN) can also help, giving workers a secure means of accessing corporate data or otherwise connecting to networks from remote locations.

Develop a culture of cybersecurity

Organizations should train employees to watch for and understand the tricks attackers use, spot and avoid potential phishing links, and flag requests for personal information or credentials.

Strong password policies, password managers, and multifactor authentication (MFA) also make it more difficult for threat actors to guess, brute force, or use stolen credentials.

Use a cybersecurity solution

Staying ahead of ransomware demands a view into what’s happening across your IT environment. Cybersecurity solutions like Field Effect MDR that detect and respond to suspicious activity across networks, end-user devices, and cloud services can help identify and mitigate potential threats early.

Related Articles