Advertisement · 728 × 90
#
Hashtag
#blackbasta
Advertisement · 728 × 90
Preview
Black Basta Ransomware: Unmasking a Lethal Cyber Threat In this episode of the Deep Dive podcast, we uncover the inner workings of Black Basta, one of the most sophisticated ransomware families wreaking havoc on enterprises worldwide. Known for its double…

Black Basta Ransomware: Unmasking a Lethal Cyber Threat. Learn how it operates, spreads, and what organizations can do to defend against this dangerous attack.

#BlackBasta #Ransomware #CyberSecurity #ThreatIntelligence #Infosec #Podcast

pca.st/m02vsy5z

0 0 0 0
Preview
What Remains of Black Basta Now That Alleged Gang Leader Joined the Most Wanted List? The EU and INTERPOL added alleged BlackBasta leader 35-year-old Russian national Oleg Evgenievich Nefedov to their Most Wanted and Red Notice lists. Researchers analyzed network IoCs from a recent BlackBasta campaign—identifying 15 IP IoCs, thousands of related email- and string-connected domains, evidence of phishing and vulnerability exploitation for initial access, data exfiltration, and a double-extortion ransomware model. #BlackBasta #OlegNefedov

Oleg Evgenievich Nefedov, alleged BlackBasta leader, added to EU Most Wanted and INTERPOL Red Notice lists. BlackBasta uses phishing, vulnerability exploits, and double-extortion ransomware. #BlackBasta #Ransomware #Russia

1 0 0 0

So much to talk about, about #BlackBasta, and so little time to spend on this.

Tbh, I've already started a fatty-huge content on this, maybe I'll release later.

Now need to feed my #Molty🦞 with your data 😎

4 1 0 0
Post image

⚠️ Black Basta resurfaces with refined ransomware tactics

Black Basta ransomware has re-emerged with updated tooling, tighter victim targeting, and improved lateral movement techniques, signaling an operational revival after months of reduced activity.

#ransomNews #BlackBasta #ransomware

4 0 0 1
Preview
Federal Agencies Worldwide Hunt for Black Basta Ransomware Leader International operation to catch Ransomware leader  International law enforcement agencies have increased their search for individuals linked to the Black Basta ransomware campaign. Agencies confirmed that the suspected leader of the Russia-based Ransomware-as-a-service (RaaS) group has been put in the EU’s and Interpol’s Most Wanted list and Red Notice respectively. German and Ukrainian officials have found two more suspects working from Ukraine.  As per the notice, German Federal Criminal Police (BKA) and Ukrainian National Police collaborated to find members of a global hacking group linked with Russia.  About the operation  The agencies found two Ukrainians who had specific roles in the criminal structure of Black Basta Ransomware. Officials named the gang’s alleged organizer as Oleg Evgenievich Nefedov from Russia. He is wanted internationally. German law enforcement agencies are after him because of “extortion in an especially serious case, formation and leadership of a criminal organization, and other criminal offenses.” According to German prosecutors, Nefedov was the ringleader and primary decision-maker of the group that created and oversaw the Black Basta ransomware. under several aliases, such as tramp, tr, AA, Kurva, Washingt0n, and S.Jimmi. He is thought to have created and established the malware known as Black Basta.  The Ukrainian National Police described how the German BKA collaborated with domestic cyber police officers and investigators from the Main Investigative Department, guided by the Office of the Prosecutor General's Cyber Department, to interfere with the group's operations. The suspects Two individuals operating in Ukraine were found to be carrying out technical tasks necessary for ransomware attacks as part of the international investigation. Investigators claim that these people were experts at creating ransomware campaigns and breaking into secured systems. They used specialized software to extract passwords from business computer systems, operating as so-called "hash crackers."  Following the acquisition of employee credentials, the suspects allegedly increased their control over corporate environments, raised the privileges of hacked accounts, and gained unauthorized access to internal company networks. Authorities claimed that after gaining access, malware intended to encrypt files was installed, sensitive data was stolen, and vital systems were compromised. The suspects' homes in the Ivano-Frankivsk and Lviv regions were searched with permission from the court. Digital storage devices and cryptocurrency assets were among the evidence of illicit activity that police confiscated during these operations.

Federal Agencies Worldwide Hunt for Black Basta Ransomware Leader #AI #BlackBasta #BlackBastaRansomware

0 0 0 0
Preview
Inside Black Basta: The Rise and Fall of a Ransomware Empire & Cybercrime's Next Threat Podcast Episode · TechDaily.ai · 01/23/2026 · 15m

Dive into the Black Basta ransomware group—its rise, attack tactics, and eventual downfall. Learn about emerging ransomware trends and how organizations can stay ahead of evolving cyber threats.

podcasts.apple.com/us/podcast/i...

#BlackBasta #Ransomware #MalwareAnalysis #DataProtection

3 0 0 0
Preview
Unmasked by Leaks: The Hidden Backbone of a Ransomware Operation The leaks tied to the BlackBasta ransomware group and Russian hosting company Media Land pulled back the curtain on something defenders.

Unmasked by #Leaks: The leaks tied to the #BlackBasta ransomware group and #Russia #hosting company #MediaLand pulled back the curtain on something defenders rarely get to see: the internal machinery and people behind a major #ransomware operation.

gbhackers.com/ransomware-o...

3 1 0 0
Post image

Ukraine Germany Target Black Basta
Read More: buff.ly/drXo4Rw

#BlackBasta #Ransomware #LawEnforcement #ThreatDisruption #Cybercrime #InternationalOperation #ThreatActors #OpSec #CyberIntel #SecurityNews

0 0 0 0
Preview
Black Basta ransomware boss placed on EU and Interpol ‘most wanted’ lists The mastermind of the gang behind the 2024 Zirco Data hack, as well as more than 500 others, has been pinged alongside two other hackers.

The alleged boss of the Black Basta ransomware gang has been added to EU and Interpol most-wanted lists as authorities seek help locating him. 

www.cyberdaily.au/security/131...

#Cybersecurity #Ransomware #ThreatIntel #Infosec #BlackBasta

0 0 0 0
German Authorities Identify Black Basta Ringleader, Now Added to EU Most-Wanted and Interpol Red Notice Lists German authorities have named Oleg Nefekov, the alleged leader of the Black Basta ransomware group, on the EU's most-wanted list.

Full Article: www.technadu.com/german-autho...

What do you think? Comment your opinion below.
#CyberSecurity #RansomwareAttacks #BlackBasta #CyberCrime #EU #INTERPOL

0 0 0 0
Post image

German authorities have named the alleged founder of Black Basta ransomware, now added to the EU most-wanted list and issued an INTERPOL Red Notice.
Linked to ~700 attacks worldwide since 2022.
Link in pinned post.

#CyberSecurity #Ransomware #BlackBasta #InfoSec

0 0 1 0
Preview
European Authorities Identify Black Basta Suspects as Ransomware Group Collapses  Two Ukrainians are now under suspicion of aiding Black Basta, a ransomware network tied to Russia, after joint work by police units in Ukraine and Germany - this step adds pressure on the hacking group’s operations. The man believed to lead the gang, Oleg Evgenievich Nefedov, aged thirty-five and holding Russian citizenship, appears on key global alerts: one issued by the EU, another by INTERPOL. Though named, he remains at large.  A Ukrainian cybercrime unit identified two people who handled technical tasks for a ransomware network, focusing on breaking into secured systems. These individuals worked by uncovering encrypted passwords through dedicated tools. Their job was to unlock access codes so others could move deeper. With those login details, associates entered company servers without permission. They installed malicious encryption programs afterward. Victims then faced demands for money before files would be released.  Finding hidden data drives inside apartments across Ivano-Frankivsk and Lviv opened a path toward tracking illegal transactions. Though police stayed silent on custody details, they emphasized digital trails now feed directly into active probes.  Emerging in April 2022, Black Basta quickly rose as a leading ransomware force worldwide. Over 500 businesses in North America, Europe, and Australia faced its attacks, bringing in hundreds of millions through crypto ransoms. Instead of acting alone, the group used a service-based approach, pulling in partners who received profit cuts for launching assaults on their behalf.  Early in 2025, internal chat records from Black Basta were made public, showing how the group operated and naming those involved. Nefedov emerged as the central figure behind the network; his known aliases included Tramp, Trump, GG, and AA. Evidence within the files suggested ties between him and high-level individuals in Russian politics. Links to state security bodies like the FSB and GRU appeared in some messages.  Such affiliations might explain why legal action against him never moved forward. The disclosure offered rare insight into an otherwise hidden criminal ecosystem. A report from June 2024 noted a short detention of Nefedov in Yerevan, Armenia; authorities let him go afterward. Although listed internationally as a fugitive, where he is now has not been confirmed - evidence suggests Russia may be harboring him.  Some researchers connect Nefedov to Conti, a well-known ransomware outfit that ended in 2022. When Conti broke apart, new groups appeared - Black Basta, BlackByte, and KaraKurt among them. Following the split, ex-Conti members moved into different ransomware efforts, though certain ones eventually stopped operating. A different analysis by Analyst1 showed Black Basta made frequent use of Media Land - an internet host blacklisted by U.S., British, and Australian governments in late 2025 due to its resistance to takedown requests.  According to officials in Germany, Nefedov was responsible for choosing victims, bringing in new people, handling payment talks after attacks, then splitting the money taken with others involved. After the leaks, activity from Black Basta's systems stopped. Its public leak page vanished by February.  Still, security analysts note such criminal networks frequently reappear under different names or combine forces elsewhere. Data collected by ReliaQuest together with Trend Micro points toward ex-members possibly joining CACTUS. A sharp increase in victims claimed by CACTUS emerged right when Black Basta faded.

European Authorities Identify Black Basta Suspects as Ransomware Group Collapses #BlackBasta #BlackBastaRansomware #BlackBastaRansomwaregang

0 0 0 0
Preview
Black Basta boss makes it onto Interpol's 'Red Notice' list The identity of the Black Basta ransomware gang leader has been confirmed by law enforcement in Ukraine and Germany, and the individual has been added to the wanted list of Europol and Interpol.

#BlackBasta boss makes it onto #Interpol's 'Red Notice' list

www.bleepingcomputer.com/news/security/black-bast...

#cybercrime #ransomware

0 0 0 0
Post image

Global authorities intensify the hunt for Black Basta's leader, Oleg Nefedov, now on EU's Most Wanted and INTERPOL's Red Notice. #CyberSecurity #Ransomware #BlackBasta #CyberCrime Link: thedailytechfeed.com/internationa...

0 0 0 0
Preview
Black Basta Under Pressure After Ukraine Germany Enforcement Operation   Investigators say the Black Basta ransomware campaign left a trail of disruption that extended across Europe and beyond, impacting everything from hospital wards to industrial production lines that were abruptly halted, resulting in a temporary ban of internet and phone use. Prosecutors from the German Federal Ministry of Justice, along with international law enforcement partners, now believe that the trail of this extortion, the most damaging in recent years, can be traced back to one individual who they describe as the driving force behind one of these operations.  There has been an investigation into whether Oleg Nefedov was the architect and operational leader of the Black Basta group. Authorities have identified him as a Russian national.  Authorities accuse him of coordinating a massive ransomware campaign against companies and public institutions across multiple continents by forming and leading an overseas criminal organization. There is a suspicion among investigators that Nefedov was responsible for leading the organization's core activities, including selecting targets, recruiting affiliates, orchestrating intrusions, and negotiating ransoms, while the proceeds of the transactions were laundered via cryptocurrency wallets and distributed among all participants in the scheme. Black Basta was also analyzed from an online alias perspective and suspected ties to a now-defunct ransomware collective named Conti. This reinforces the assessment that Black Basta arose from an advanced and interconnected cybercrime ecosystem that has matured over many years.  Officials from the Federal Republic of Germany have confirmed that Nefedov still resides in Russia and that he has been placed on Interpol's international wanted list, an indication that European authorities have intensified their efforts to identify and pursue the individuals behind cyber extortion committed in large scale industrial scales.  The Federal Criminal Police Office of Germany has confirmed that Oleg Nefedov, a 36-year-old Russian national suspected of leading the Black Basta ransomware group, is one of the suspected leaders of the ransomware. He is charged with forming criminal organizations abroad, orchestrating large-scale extortion crimes, and committing related cyber crimes.  A central coordinator was alleged by investigators to be Nefedov. During his time at the group, Nefedov selected targets, recruited and managed members, assigned operational roles, negotiated ransom demands, and distributed extorted proceeds, which were usually paid in cryptocurrency, according to the investigation.  There were several aliases he operated under on the internet-including tramp, tr, gg, kurva, AA, Washingt0n, and S.Jimmi-and authorities say he may have maintained a connection to the now-defunct Conti ransomware group.  According to German authorities, Nefedov is believed to be in Russia at the moment, though his exact location remains unclear. Interpol has also added him to a global wanted list. In recent months, the investigation has been further strengthened by numerous disclosures and enforcement actions that have heightened the investigation.  A leaked internal chat log attributed to Black Basta, which gave rare insights into the group's organization, operations, and communications, as well as exposing identifying information about the individuals involved. This information provided an insight into the organization's inner workings and daily operations.  According to cybersecurity researchers, many of the Black Basta members previously operated within criminal networks that were closely linked to the Conti and Ryuk ransomware strains, as well as the TrickBot banking trojan — operations that have led Western governments to identify and sanction more than a dozen individuals for their involvement in such attacks.  According to researchers and investigators, Black Basta is the result of the collapse of Conti, a ransomware operation which fragmented into smaller, semi-autonomous cells after it shut down. In a recent study published by the International Security Agency, Black Basta has been widely interpreted as a rebranding of the former Conti infrastructure, with many of those splinter groups either embedding themselves into existing ransomware schemes or controlling existing operations.  It has been demonstrated that this view has been reinforced by a review of leaked internal communications by Trellix researchers. According to those who reviewed the Black Basta chat logs, GG and Chuck were exchanging emails about a purported $10 million reward for information about an individual, referred to as “tr” or “-amp,” an individual which researchers believe corresponds to a bounty offered by the U.S. Government for information that will lead to the identification of key Conti figures, including Tramp, the hacker.  Additionally, Trellix researchers found that within the leaked conversations, GG was identified as Tramp, who had been regarded as Conti's leader for some time, by a participant called "bio," sometimes known as "pumba," a figure who was previously connected to the Conti organization.  These findings echo those released earlier in February 2022, when a researcher revealed Conti's internal chats in the aftermath of the Russian invasion of Ukraine, revealing internal dynamics and explicitly referring to Tramp as leader of the group.  It is well-known that such leaks have long been a source of attribution efforts within the cybersecurity industry, but German authorities say that their current case rests on evidence gathered through intelligence and investigation on the German side.  Oleg Nefedov has been identified formally as the head of the Black Basta ransomware group by Europol, and the Interpol red notice database has been updated with his name. This is a crucial step in the international effort to enquire about the group's activities, marking a decisive step in the effort to enshrine accountability for the group.  The data breach is the result of an attack on more than 500 organizations across North America, Europe, and Australia by means of Black Basta's ransomware-as-a-service model, which was active since April 2022 and caused hundreds of millions of dollars in damage in the process. Two suspects in western Ukraine, which were allegedly acting as hash crackers in order to help facilitate network intrusions, data theft, and ransomware deployment, were also announced by German authorities. The police seized digital devices and cryptocurrency during raids that are related to the incident, and are currently conducting forensic analysis of the evidence.  Official figures underscore the scale of the damage attributed to the group. An official press release from the German authorities stated that documented Black Basta attacks have caused prolonged operational disruptions at over 100 companies in Germany, as well as over 700 organizations worldwide, including hospitals, public institutions, and government agencies.  In Germany, it is estimated that losses will exceed 20 million euros in the next few years. Research conducted in December 2023 by blockchain analytics firm Elliptic and Corvus Insurance found that over the course of the past four years, the group accumulates at least $107 million in Bitcoin ransom payments, which has been determined to be paid by over 329 victims in 31 countries across the world.  A detailed analysis of blockchain transactions also revealed a clear financial and operational link between Black Basta and Conti, which supported the conclusions of law enforcement that this syndicate grew out of a well-established, interconnected cybercrime ecosystem that was well-established and interconnected.  In light of the scope and selectivity of Black Basta's operations, it is evident why it has been a top priority for law enforcement and security researchers to investigate. A number of victims have been confirmed, including Rheinmetall, Hyundai, BT Group, Ascension, ABB, the American Dental Association, U.K.-based outsourcing company Capita, the Toronto Public Library, the Yellow Pages Canada, and others.  These victims include German defense contractor Rheinmetall, Hyundai's European division, BT Group, as well as the United States healthcare provider Ascension. According to the researchers, the group did not operate in an indiscriminate manner, but applied a targeted strategy based on geography, industry, and organizational revenue, while also closely tracking geopolitical developments in order to reduce the likelihood of retaliation from law enforcement agencies.  A ransomware operation known as Black Basta, which is characterized by a focus on large, high-revenue organizations with the ability to pay large ransoms, was known to be targeting large, high-revenue organizations. Based on internal communications, it appears that entities in both the United States and Germany were the most likely to pay a ransom.  There are 57 percent of victims in the United States who had reported a leak between April 2022 and January 2025, with Germany accounting for 12 percent, while additional victims were observed throughout Europe, Asia Pacific and the Americas as well.  Accordingly, that assessment is reflected in activity observed on the group's leak site. Several leaks of internal chats in the group have introduced rare insights into the group's internal structure, its financial management, and its extortion practices, which have strengthened efforts to identify key actors and disrupt their operations by exposing real-world names and financial transactions.  Despite the fact that Black Basta’s data leak site is currently offline, analysts warn that the group still has the resources and incentives to re-emerge, either by adopting a new name or partnering with other ransomware crews, illustrating how authorities continue to face challenges in dismantling entrenched cybercrime networks rather than simply disrupting them, even when the site is offline.  Together, these findings present a detailed portrayal of a ransomware operation that developed out of a fractured but resilient cybercrime ecosystem into a global enterprise that has far-reaching consequences. Having identified an alleged leader along with financial tracing, leaking internal communications, and coordinated international enforcement, German authorities state that the investigation has matured—with an emphasis not only on disruption, but also on attribution and accountability for ransomware.  It should be noted that while law enforcement actions have slowed Black Basta's visible activities, experts and officials agree that dismantling such networks will take years, especially when key figures are believed to be operating in jurisdictions that are beyond the reach of law enforcement officials.  In addition to demonstrating the extent of the harm caused by ransomware campaigns, the case also highlights the growing determination of governments to pursue those responsible, even through the broader cybercrime landscape continues to evolve, fragment, and resurface.

Black Basta Under Pressure After Ukraine Germany Enforcement Operation #BlackBasta #ContiRansomware #CyberExtortion

0 0 0 0
Preview
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta. In addition, the group's alleged leader, a 35-year-old Russian national named Oleg Evgenievich Nefedov (Нефедов Олег Евгеньевич), has been added to the European Union's Most Wanted and INTERPOL's Red Notice lists, authorities

iT4iNT SERVER Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice VDS VPS Cloud #Ransomware #CyberSecurity #BlackBasta #INTERPOL #EUMostWanted

1 0 0 0
Post image

Ucraina e Germania smantellano Black Basta? 2 arresti per ransomware, coinvolto un russo

📌 Link all'articolo : www.redhotcyber.com/post/ucr...

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #blackbasta #gruppocriminale #infiltrorete

0 0 0 0

📰 Warga Ukraina Diekstradisi ke AS atas Tuduhan Terlibat dalam Operasi Ransomware Conti

👉 Baca artikel lengkap di sini: ahmandonk.com/2025/11/01/ukrainian-ext...

#blackbasta #conti #cybercrime #doj #extradition #fbi #ransomware #trickbot #ukraine

0 0 0 0

BlackBasta exfiltrated over 6M records from Capita in Mar 2023; ICO’s Oct 2025 report cites control failures across multiple legal entities and a £14M fine. #BlackBasta #Capita #ransomware https://bit.ly/4os7gTS

0 0 0 0

Des nouvelles de la lutte contre le #PotatoCrime par le #FBI : "Révélations sur le « Group 78 », une unité secrète américaine chargée de la lutte contre les potatocriminels" #Group78 #PotatoSécurité #BlackBasta ...

www.lemonde.fr/pixels/artic...

0 0 0 0

Des nouvelles de la lutte contre le #CyberCrime par le #FBI : "Révélations sur le « Group 78 », une unité secrète américaine chargée de la lutte contre les cybercriminels" #Group78 #CyberSécurité #BlackBasta ...

www.lemonde.fr/pixels/artic...

0 0 0 0

Anfang November 2024 trafen sich Polizeibehörden bei Europol in Den Haag, um zu beraten, was sie gegen #BlackBasta tun können. Das FBI stellte dort eine geheime Arbeitsgruppe vor: Diese “Group 78” solle Druck auf die Erpresser machen, in der Hoffnung, dass sie Russland verlassen. 2/3

3 0 1 0
Preview
Ransomware: Wenn das FBI Grenzen überschreitet Die Cybergang Black Basta ist hochprofessionell, aggressiv, schreckt vor kaum etwas zurück. Das FBI will sie zerschlagen. Unsere Recherche zeigt: mit dubiosen Methoden.

Im Februar 2025 veröffentlichten Unbekannte eine große Sammlung interner Nachrichten der Cybererpressergruppe #BlackBasta. Aber woher stammte das Leak? Zusammen mit @untersin.gr + @flrnd.bsky.social von @lemonde.fr sind wir dem nachgegangen und haben eine Vermutung 1/3 www.zeit.de/digital/2025...

5 1 1 0

A due anni dall'attacco di #BlackBasta, che ne aveva disturbato i sistemi, per #ACEA non sarà un'estate tranquilla.

Grazie a #CyberSecurityItalia per i contenuti esaustivi e tempestivi:
• www.key4biz.it/acea-ancora-...

• www.cybersecitalia.it/attacco-rans...

4 0 1 1
Post image

🚨 Sermo 🇺🇸 has just been added to the data leak site of #ransomware gang #Medusa with a $500K ransom demand.

The healthcare tech company hasn't confirmed an incident but was previously claimed by #BlackBasta in April 2024.

bit.ly/4bsqDGS

2 0 0 0
Post image

‼️ McLean Mortgage Corporation 🇺🇸 is notifying 30,453 people of an Oct '24 #databreach that compromised SSNs, driver’s license numbers & financial account numbers.

#Ransomware gang #BlackBasta claimed the attack after allegedly stealing 1 TB of data.

bit.ly/4kCQhN8

By: @pabischoff.bsky.social

2 1 0 0
Post image

🚨 Despite a decrease in recent activity linked to the #BlackBasta ransomware group, Rapid7 has observed sustained social engineering attacks that suggest #BlackSuit affiliates have either adopted Black Basta’s strategy or absorbed members of the group: r-7.co/3ZYK59Q

0 0 0 0
Preview
Hackers Tricking Employees with Fake IT Calls and Email Floods in New Ransomware Scam   A growing number of cyberattacks are being carried out by a group linked to the 3AM ransomware. These attackers are using a combination of spam emails and fake phone calls pretending to be a company’s tech support team. Their goal is to fool employees into giving them access to internal systems. This method, which has been seen in past cyber incidents involving other groups like Black Basta and FIN7, is becoming more widespread due to how effective it is. Cybersecurity company Sophos has confirmed at least 55 attacks using this approach between November 2024 and January 2025. These incidents appear to come from two different hacker groups following similar tactics. In one recent case during early 2025, the attackers targeted a company using a slightly different method than before. Instead of pretending to be tech support over Microsoft Teams, they called an employee using a fake caller ID that showed the company’s actual IT department number. The call took place while the employee’s inbox was being flooded with dozens of spam emails in just minutes — a technique known as email bombing. During the call, the attacker claimed the employee's device had security issues and asked them to open Microsoft’s Quick Assist tool. This is a real remote help feature that allows another person to take control of the screen. Trusting the caller, the employee followed instructions and unknowingly handed over access to the attacker. Once inside, the hacker downloaded a dangerous file disguised as a support tool. Inside the file were harmful components including a backdoor, a virtual machine emulator (QEMU), and an old Windows system image. These tools allowed the attacker to hide their presence and avoid detection by using virtual machines to move through the network. The hacker then used tools like PowerShell and WMIC to explore the system, created a new admin account, installed a remote support tool called XEOXRemote, and gained control of a domain-level account. Although Sophos security software stopped the ransomware from spreading and blocked attempts to shut down protections, the hacker managed to steal 868 GB of company data. This data was sent to cloud storage using a syncing tool called GoodSync. The full attack lasted around nine days. The majority of the data theft happened in the first three days before the attackers were cut off from further access. To protect against such attacks, Sophos suggests reviewing admin accounts for weaknesses, using security tools that can spot unusual uses of trusted programs, and setting strict rules for running scripts. Most importantly, companies should train employees to recognize signs of fake support calls and suspicious emails, as these scams depend on fooling people — not just machines. The 3AM ransomware group is relatively new, first spotted in late 2023, but appears to have links with well-known cybercrime networks like Conti and Royal.

Hackers Tricking Employees with Fake IT Calls and Email Floods in New Ransomware Scam #BlackBasta #CyberAttacks #GoodSync

0 0 0 0