Ransomware Rodeo: Black Basta’s Wild West Tactics Keep Evolving!
Black Basta ransomware affiliates are sticking to their classic email bombing and Microsoft Teams phishing tactics, but with a twist—now they’re throwing in some Python script execution for good measure! Even after their chat logs leaked, they’re pivoting and regrouping faster than you can say “cybersecurity breach.”

Hot Take:
Looks like the Black Basta crew has decided to give us a masterclass in resilience! Who knew that when life gives you lemons, you could just squeeze them into a Python script and make malware-ade?
Key Points:
- Former Black Basta members are sticking to email bombing and Teams phishing, now with a spicy Python twist.
- Half of Teams phishing attacks originate from onmicrosoft[.]com domains, with breached domains accounting for 42%.
- Black Basta’s shutdown hasn’t stopped its affiliates, who may have joined CACTUS or BlackLock groups.
- New tactics involve Python scripts and Java-based RATs using cloud services for stealthy command execution.
- Ransomware landscape is buzzing with activity, from Scattered Spider’s multi-targeting to VanHelsing’s code leak.
Already a member? Log in here