Advertisement · 728 × 90
#
Hashtag
#blackbastaransomware
Advertisement · 728 × 90
Preview
Federal Agencies Worldwide Hunt for Black Basta Ransomware Leader International operation to catch Ransomware leader  International law enforcement agencies have increased their search for individuals linked to the Black Basta ransomware campaign. Agencies confirmed that the suspected leader of the Russia-based Ransomware-as-a-service (RaaS) group has been put in the EU’s and Interpol’s Most Wanted list and Red Notice respectively. German and Ukrainian officials have found two more suspects working from Ukraine.  As per the notice, German Federal Criminal Police (BKA) and Ukrainian National Police collaborated to find members of a global hacking group linked with Russia.  About the operation  The agencies found two Ukrainians who had specific roles in the criminal structure of Black Basta Ransomware. Officials named the gang’s alleged organizer as Oleg Evgenievich Nefedov from Russia. He is wanted internationally. German law enforcement agencies are after him because of “extortion in an especially serious case, formation and leadership of a criminal organization, and other criminal offenses.” According to German prosecutors, Nefedov was the ringleader and primary decision-maker of the group that created and oversaw the Black Basta ransomware. under several aliases, such as tramp, tr, AA, Kurva, Washingt0n, and S.Jimmi. He is thought to have created and established the malware known as Black Basta.  The Ukrainian National Police described how the German BKA collaborated with domestic cyber police officers and investigators from the Main Investigative Department, guided by the Office of the Prosecutor General's Cyber Department, to interfere with the group's operations. The suspects Two individuals operating in Ukraine were found to be carrying out technical tasks necessary for ransomware attacks as part of the international investigation. Investigators claim that these people were experts at creating ransomware campaigns and breaking into secured systems. They used specialized software to extract passwords from business computer systems, operating as so-called "hash crackers."  Following the acquisition of employee credentials, the suspects allegedly increased their control over corporate environments, raised the privileges of hacked accounts, and gained unauthorized access to internal company networks. Authorities claimed that after gaining access, malware intended to encrypt files was installed, sensitive data was stolen, and vital systems were compromised. The suspects' homes in the Ivano-Frankivsk and Lviv regions were searched with permission from the court. Digital storage devices and cryptocurrency assets were among the evidence of illicit activity that police confiscated during these operations.

Federal Agencies Worldwide Hunt for Black Basta Ransomware Leader #AI #BlackBasta #BlackBastaRansomware

0 0 0 0
Preview
European Authorities Identify Black Basta Operatives, Add Alleged Ringleader to EU Most Wanted List   Law enforcement agencies in Ukraine and Germany have identified two Ukrainian nationals suspected of collaborating with the Russia-linked ransomware-as-a-service (RaaS) group known as Black Basta. Authorities also confirmed that the group’s alleged leader, 35-year-old Russian citizen Oleg Evgenievich Nefedov (Нефедов Олег Евгеньевич), has been placed on both the European Union’s Most Wanted list and INTERPOL’s Red Notice database. "According to the investigation, the suspects specialized in technical hacking of protected systems and were involved in preparing cyberattacks using ransomware," Ukraine’s Cyber Police said in an official statement. Investigators revealed that the two suspects allegedly operated as “hash crackers,” focusing on extracting passwords from secured systems using specialized tools. Once credentials were obtained, other members of the ransomware operation infiltrated corporate networks, deployed ransomware, and demanded payment in exchange for restoring access to encrypted data. Search operations carried out at the suspects’ homes in Ivano-Frankivsk and Lviv resulted in the seizure of digital storage devices and cryptocurrency holdings, authorities said. Active since April 2022, Black Basta has reportedly attacked more than 500 organizations across North America, Europe, and Australia. The ransomware group is believed to have generated hundreds of millions of dollars in cryptocurrency through extortion payments. In early 2025, a cache of internal Black Basta chat logs spanning roughly a year surfaced online. The leaked material provided rare insight into the group’s hierarchy, internal communications, key participants, and the security flaws they exploited to gain initial access to victim networks. Those leaks identified Nefedov as the central figure behind Black Basta, noting that he operated under multiple aliases including Tramp, Trump, GG, and AA. Additional documents alleged that he maintained links with senior Russian political figures and intelligence services, including the FSB and GRU. Investigators believe Nefedov used these alleged connections to shield his activities and avoid prosecution. Analysis by Trellix later indicated that despite being arrested in Yerevan, Armenia, in June 2024, Nefedov managed to secure his release. Other aliases attributed to him include kurva, Washingt0n, and S.Jimmi. While he is believed to be residing in Russia, his precise location remains unknown. Further intelligence has linked Nefedov to Conti, the now-defunct ransomware group that emerged in 2020 as a successor to Ryuk. In August 2022, the U.S. State Department announced a $10 million reward for information leading to five individuals associated with Conti, including Target, Tramp, Dandis, Professor, and Reshaev. Black Basta emerged as an independent operation following the Conti brand’s shutdown in 2022, alongside groups such as BlackByte and KaraKurt. Former Conti affiliates also dispersed to other ransomware operations including BlackCat, Hive, AvosLocker, and HelloKitty, many of which have since ceased activity. A separate report released this week by Analyst1 highlighted Black Basta’s heavy reliance on Media Land, a bulletproof hosting provider sanctioned by the U.S., U.K., and Australia in November 2025, along with its general director Aleksandr Volosovik, also known as Yalishanda. Despite the sanctions, the group allegedly received preferential, VIP-level service. "[Nefedov] served as the head of the group. As such, he decided who or which organisations would be the targets of attacks, recruited members, assigned them tasks, took part in ransom negotiations, managed the ransom obtained by extortion, and used it to pay the members of the group," Germany’s Federal Criminal Police Office (BKA or Bundeskriminalamt) stated. Following the leaks, Black Basta appears to have ceased operations. The group has remained inactive since February and dismantled its data leak site later that month. However, cybersecurity experts caution that ransomware groups often dissolve only to reappear under new identities. Reports from ReliaQuest and Trend Micro suggest that several former Black Basta affiliates may have transitioned to the CACTUS ransomware operation. This theory is supported by a sharp increase in victims listed on CACTUS’ leak site in February 2025, coinciding with Black Basta’s disappearance.

European Authorities Identify Black Basta Operatives, Add Alleged Ringleader to EU Most Wanted List #BlackBastaRansomware #CyberCrime #CybercrimeInvestigation

0 0 0 0
Preview
European Authorities Identify Black Basta Suspects as Ransomware Group Collapses  Two Ukrainians are now under suspicion of aiding Black Basta, a ransomware network tied to Russia, after joint work by police units in Ukraine and Germany - this step adds pressure on the hacking group’s operations. The man believed to lead the gang, Oleg Evgenievich Nefedov, aged thirty-five and holding Russian citizenship, appears on key global alerts: one issued by the EU, another by INTERPOL. Though named, he remains at large.  A Ukrainian cybercrime unit identified two people who handled technical tasks for a ransomware network, focusing on breaking into secured systems. These individuals worked by uncovering encrypted passwords through dedicated tools. Their job was to unlock access codes so others could move deeper. With those login details, associates entered company servers without permission. They installed malicious encryption programs afterward. Victims then faced demands for money before files would be released.  Finding hidden data drives inside apartments across Ivano-Frankivsk and Lviv opened a path toward tracking illegal transactions. Though police stayed silent on custody details, they emphasized digital trails now feed directly into active probes.  Emerging in April 2022, Black Basta quickly rose as a leading ransomware force worldwide. Over 500 businesses in North America, Europe, and Australia faced its attacks, bringing in hundreds of millions through crypto ransoms. Instead of acting alone, the group used a service-based approach, pulling in partners who received profit cuts for launching assaults on their behalf.  Early in 2025, internal chat records from Black Basta were made public, showing how the group operated and naming those involved. Nefedov emerged as the central figure behind the network; his known aliases included Tramp, Trump, GG, and AA. Evidence within the files suggested ties between him and high-level individuals in Russian politics. Links to state security bodies like the FSB and GRU appeared in some messages.  Such affiliations might explain why legal action against him never moved forward. The disclosure offered rare insight into an otherwise hidden criminal ecosystem. A report from June 2024 noted a short detention of Nefedov in Yerevan, Armenia; authorities let him go afterward. Although listed internationally as a fugitive, where he is now has not been confirmed - evidence suggests Russia may be harboring him.  Some researchers connect Nefedov to Conti, a well-known ransomware outfit that ended in 2022. When Conti broke apart, new groups appeared - Black Basta, BlackByte, and KaraKurt among them. Following the split, ex-Conti members moved into different ransomware efforts, though certain ones eventually stopped operating. A different analysis by Analyst1 showed Black Basta made frequent use of Media Land - an internet host blacklisted by U.S., British, and Australian governments in late 2025 due to its resistance to takedown requests.  According to officials in Germany, Nefedov was responsible for choosing victims, bringing in new people, handling payment talks after attacks, then splitting the money taken with others involved. After the leaks, activity from Black Basta's systems stopped. Its public leak page vanished by February.  Still, security analysts note such criminal networks frequently reappear under different names or combine forces elsewhere. Data collected by ReliaQuest together with Trend Micro points toward ex-members possibly joining CACTUS. A sharp increase in victims claimed by CACTUS emerged right when Black Basta faded.

European Authorities Identify Black Basta Suspects as Ransomware Group Collapses #BlackBasta #BlackBastaRansomware #BlackBastaRansomwaregang

0 0 0 0
Preview
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice unlock the encrypted data read more about Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice

Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice reconbee.com/black-basta-...

#blackbastaransomware #ransomware #INTERPOL #rednotice #EU #cybercriminal #cybercrime

0 0 0 0
Preview
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks covert and enables threat actors to pose read more about Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks reconbee.com/former-black...

#blackbastaransomware #ransomwareattack #microsoftteams #pythonscripts #python #microsoft #cyberattack

0 0 0 0
Preview
Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia he made contact with senior officials read more about Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia

Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia reconbee.com/leaked-black...

#blackbastaransomware #ransomwareattack #Russian #Armenia #blackbasta #cyberattacks

1 0 0 0
Preview
Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts QBot as a delivery vehicle read more about Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts reconbee.com/leaked-black...

#blackbastaransomware #ransomwareattack #ransomware #cyberattack #CyberSecurityAwareness #CybersecurityNews

1 0 0 0
Preview
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia Black Basta ransomware-as-a-service (RaaS) operation has targeted over 500 private industry and critical infrastructure entities in North America, Eur

#BlackBastaRansomware Strikes 500+ Entities Across North America, Europe, and Australia thehackernews.com/2024/05/blac... via @TheHackersNews

1 0 0 0