LevelBlue Completes Acquisition of Cybereason. Learn more

LevelBlue Completes Acquisition of Cybereason. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Manage Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse

In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta, a prolific ransomware group.

Trustwave SpiderLabs has taken an in-depth look at the leaked contents, which spell out in detail how the group thinks and operates, revealing discussions on tactics and the effectiveness of various attack tools. Even going so far as to debate the ethical and legal implications of targeting Ascension Health.

You can download the full report here: A Deep Dive into the Leaked Black Basta Chat Logs.

The messages were initially uploaded to MEGA and then reuploaded directly to Telegram on February 11 by the online persona ExploitWhispers. The JSON-based dataset consisted of more than 190,000 messages allegedly exchanged between group members from September 18, 2023, to September 28, 2024.

This data dump offers unparalleled insights into the group's infrastructure, tactics, and inner decision-making processes, drawing inevitable comparisons to the infamous Conti leaks of 2022.

The leak does not expose every detail of the group's inner workings; however, it still provides a unique look into one of the most financially successful ransomware organizations in recent years.

"

Dedicated to hunting and eradicating the world’s most challenging threats.

"
SpiderLabs

The dataset sheds light on Black Basta's internal workflows, decision-making processes, and team dynamics, offering an unfiltered perspective on how one of the most active ransomware groups operates behind the scenes, drawing parallels to the infamous Conti leaks.

Black Basta has operated since 2022. The group generally maintains a low profile while conducting its operations that target organizations across various sectors, extracting millions in ransom payments. The messages show how members exhibit remarkable autonomy and creativity, adapting quickly to evolving security landscapes.

A significant revelation from the leak is Black Basta's reliance on social engineering tactics. While traditional phishing campaigns remain a staple, in some situations, it uses a more human approach.

For example, there were explicit discussions about targeting individuals based on gender dynamics – female callers were assigned male victims, while male operators handled calls to female targets.

The chat logs further expose Black Basta's strategic approach to vulnerability exploitation. The group actively pursues common and rare vulnerabilities, acquiring zero-day exploits to gain a competitive edge.

Its weaponization strategy demonstrates a calculated effort to maximize the impact of its attacks, often deploying Cobalt Strike for command and control operations. Notably, Black Basta developed a proprietary proxy infrastructure called "Coba PROXY" to handle large volumes of C2 traffic, enhancing both stealth and resilience.

Beyond its technical sophistication, the leak offers a glimpse into Black Basta's negotiation tactics. The group employs aggressive, psychologically manipulative strategies to pressure victims into paying ransoms.

Strategic delays and coercive language are common, with the ultimate goal of extracting the maximum financial gain. Even more concerning is its expansion into previously off-limits targets, including financial institutions within the CIS region.

While the immediate impact of the leak remains uncertain, the exposure of Black Basta's inner workings represents a rare opportunity for cybersecurity professionals to adapt and respond. Understanding its methods enables the development of more effective defensive strategies, bolstering resilience against future ransomware threats.

In the full report, we delve deeper into the technical and operational insights from the leak, exploring how Black Basta's tactics evolve in real time and what this means for the cybersecurity landscape. Stay tuned for a comprehensive analysis that unpacks the revelations and provides actionable intelligence for defenders.

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo