Ransomware Rodeo: Black Basta’s Wild West Tactics Keep Evolving!

Black Basta ransomware affiliates are sticking to their classic email bombing and Microsoft Teams phishing tactics, but with a twist—now they’re throwing in some Python script execution for good measure! Even after their chat logs leaked, they’re pivoting and regrouping faster than you can say “cybersecurity breach.”

Pro Dashboard

Hot Take:

Looks like the Black Basta crew has decided to give us a masterclass in resilience! Who knew that when life gives you lemons, you could just squeeze them into a Python script and make malware-ade?

Key Points:

  • Former Black Basta members are sticking to email bombing and Teams phishing, now with a spicy Python twist.
  • Half of Teams phishing attacks originate from onmicrosoft[.]com domains, with breached domains accounting for 42%.
  • Black Basta’s shutdown hasn’t stopped its affiliates, who may have joined CACTUS or BlackLock groups.
  • New tactics involve Python scripts and Java-based RATs using cloud services for stealthy command execution.
  • Ransomware landscape is buzzing with activity, from Scattered Spider’s multi-targeting to VanHelsing’s code leak.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?