Black Basta Ransomware: In-Depth Analysis, Detection, and Mitigation

Summary of Black Basta Ransomware

Black Basta first emerged in early 2022. The ransomware family is an evolution of the Hermes/Ryuk/Conti families. Black Basta was heavily advertised in underground cybercrime markets. Black Basta practices double extortion – demanding payment for a decryptor, as well as for the non-release of stolen data. There are Windows and LInux variants of Black Basta ransomware. The group is responsible for hundreds of attacks against global targets of varying sectors.

February 2025 Update: Nearly a year’s worth of Black Basta chat logs have been released on Telegram, providing detailed insight into the groups operational workflow, reconnaissance activities, and specific userID and details on their tactics, techniques, and procedures (TTPs).

Black Basta chat leaks via ExploitWhispers

What Does Black Basta Ransomware Target?

Black Basta ransomware has been known to target a wide range of industries, including healthcare, government, financial services, education, and media. Targeting within the CIS (Commonwealth of Independent States) is discouraged. Across 2023 and 2024, Black Basta operators heavily impacted healthcare, manufacturing, and financial services organizations. Their estimated earnings, towards the end of 2024, was in the hundreds of millions of dollars.

How Does Black Basta Ransomware Spread?

Black Basta is deployed in multiple ways: via Cobalt Strike or a similar framework, and through email phishing. BlackBasta is often delivered as a secondary infection. For example, following a Qakbot infection. Cobalt Strike is the group’s preferred attack framework. Configurations, deployments, and data extraction are automated via Ansible playbooks. The group dynamically generates C2 profiles via open-source methods (random_c2_profile). Black Basta operators rely on massive spam campaigns in conjunction with device exploitation where necessary. Multiple dropper formats have been observed including VBS, DLL, and DOC payloads.

Black Basta Ransomware Technical Details

Black Basta variants have been observed on Windows and Linux systems. Black Basta infections began with Qakbot delivered by email and macro-based MS Office documents, ISO+LNK droppers and .docx documents exploiting the MSDTC remote code execution vulnerability, CVE-2022-30190.

Manual reconnaissance is performed when Black Basta operators connect to victims through the Qakbot backdoor.

Reconnaissance utilities used by the operator are staged in a directory with deceptive names such as “Intel” or “Dell”, created in the root drive C:\.

For network scanning, Black Basta uses the SoftPerfect network scanner, netscan.exe. In addition, the WMI service is leveraged to enumerate installed security solutions. The ransomware will take steps to disable commonly used endpoint security products prior to initiating the encryption process.

Beyond the reconnaissance stage, Black Basta attempts local and domain level privilege escalation through a variety of exploits. We have seen the use of ZeroLogon (CVE-2020-1472), NoPac (CVE-2021-42287, CVE-2021-42278) and PrintNightmare (CVE-2021-34527).

Black Basta also employs an array of custom scripts and tools within their campaigns. The February 2025 Black Basta Chat Leaks provide a great deal more insight into the group’s TTPs, including specifics on tool use and victim reconnaissance.

Excerpt of leaked chats

Black Basta operators controlled an extensive infrastructure to support their storage and traffic management requirements. This includes NgINX-based proxies, rotating VPS instances for C2, FTP servers for staging and data storage. The preferred communication platforms were Matrix and Telegram. The specific CVEs highlighted across the leaks (discussed for use in targeting) are:

CVE-2023-23397 Microsoft Outlook
CVE-2023-29357 Microsoft Windows
CVE-2023-35628 Microsoft Windows
CVE-2023-36394 Microsoft Windows
CVE-2023-36745 Microsoft Exchange Server
CVE-2023-36844 Juniper Networks Junos OS
CVE-2023-36845 Juniper Networks Junos OS
CVE-2023-36874 Microsoft Windows
CVE-2023-36884 Microsoft Windows
CVE-2023-4966 Citrix NetScaler ADC
CVE-2023-7028 GitLab CE/EE GitLab CE/EE
CVE-2023-6875 WordPress, POST SMTP Mailer – Email log, Delivery Failure Notifications, Mail SMTP for WordPress plugin
CVE-2024-1086 Linux Kernel, Linux kernel's netfilter: nf_tables component
CVE-2024-1708 ConnectWise,ScreenConnect
CVE-2024-1709 ConnectWise,ScreenConnect
CVE-2024-21338 Microsoft,Windows
CVE-2024-21413 Microsoft,Outlook
CVE-2024-23897 Jenkins, Jenkins 2.441 and earlier
CVE-2024-26169 Microsoft Windows
CVE-2024-3400 Palo Alto Networks,GlobalProtect
CVE-2024-21762 Fortinet Fortinet FortiOS
CVE-2024-23108 Fortinet FortiSIEM
CVE-2021-40444 Microsoft MSHTML
CVE-2022-27925 Zimbra Collaboration Suite
CVE-2017-5715 Intel CPUs
CVE-2017-5753 Intel CPUs
CVE-2017-5754 Intel CPUs
CVE-2023-3519 Citrix ADC and Gateway
CVE-2023-3466 Citrix ADC and Gateway
CVE-2023-3467 Citrix ADC and Gateway

 

The group employs secretsdump.py alongside various other commodity keyloggers for credential harvesting and extraction. PowerShell commands and other LOL methods are used for firewall manipulation and traffic tunneling.

How to Detect Black Basta Ransomware

  • The SentinelOne Singularity XDR Platform can identify and stop any malicious activities and items related to Black Basta.

In case you do not have SentinelOne deployed, detecting this ransomware requires a combination of technical and operational measures, which are designed to identify and flag suspicious activity on the network. This allows the organization to take appropriate action, and to prevent or mitigate the impact of the ransomware attack.

  1. Use antimalware software, or other security tools, which are capable of detecting and blocking known ransomware variants. These tools may use signatures, heuristics, or machine learning algorithms, to identify and block suspicious files or activities.
  2. Monitor network traffic, and look for indicators of compromise, such as unusual network traffic patterns, or communication with known command-and-control servers.
  3. Conduct regular security audits and assessments, to identify vulnerabilities in the network and the system, and to ensure that all security controls are in place and functioning properly.
  4. Educate and train employees on cybersecurity best practices, including how to identify and report suspicious emails, or other threats.
  5. Implement a robust backup and recovery plan, to ensure that the organization has a copy of its data, and can restore it in case of an attack.

How to Mitigate Black Basta Ransomware

The SentinelOne Singularity XDR Platform detects and prevents malicious behaviors and artifacts associated with Black Basta.

  • The SentinelOne Singularity XDR Platform can return systems to their original state using either the Repair or Rollback feature.

In case you do not have SentinelOne deployed, there are several steps that organizations can take to mitigate the risk of ransomware attacks:

  1. Educate employees: Employees should be educated on the risks of ransomware and on how to identify and avoid phishing emails, malicious attachments, and other threats. They should be encouraged to report suspicious emails or attachments and avoid opening them or clicking on links or buttons.
  2. Implement strong passwords: Organizations should implement strong, unique passwords for all user accounts and regularly update and rotate these passwords. Passwords should be at least eight characters long and include a combination of uppercase and lowercase letters, numbers, and special characters.
  3. Enable multi-factor authentication: Organizations should enable multi-factor authentication (MFA) for all user accounts to provide an additional layer of security. This can be done through the use of mobile apps, such as Google Authenticator or Microsoft Authenticator, or the use of physical tokens or smart cards.
  4. Update and patch systems: Organizations should regularly update and patch their systems to fix any known vulnerabilities and to prevent attackers from exploiting them. This includes updating the operating system, applications, and firmware on all devices and disabling any unnecessary or unused services or protocols.

Implement backup and disaster recovery: Organizations should implement regular backup and disaster recovery (BDR) processes, to ensure that they can recover from ransomware attacks or other disasters. This includes creating regular backups of all data and systems and storing these backups in a secure, offsite location. The backups should be tested regularly to ensure they work and can be restored quickly and easily.

Indicators of Compromise (IoCs)

databasebb.top
bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion
aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion
stniiomyjliimcgkvdszvgen3eaaoz55hreqqx6o77yvmpwt7gklffqd.onion
orders44vz5yl7y6xajzxsdo2n6niaqu73ty4tx6ncwqnc752yzae4ad.onion
45.63.1.88
144.202.42.216
144.202.38.240
185.244.216.102
179.60.149.5
betterbossing.com
appconfigdev.com
cloudnetrecovery.com
itechnetworkbd.com
techservconsult.com
thefetchapi.com
docu-duplicator.com
posetoposeschool.com
blazingradiancesolar.com
104.255.220.21
65.181.111.9,
213.108.22.46
94.228.169.123
178.236.247.73
149.248.76.130
23.81.246.14
192.52.166.141
bestflowers247.online
matrixtcFJHPDblmt2rg.network
matrix.bestflowers247.online
a996ccd0d58125bf299e89f4c03ff37afdab33fc
ff57cda4829978d8b6f7f1f31356f291b37acaa6
fde1579fe21407b14c803ce472d39dece44fa640
f70a68cb9c9548e644b14fa7f6af0e86cd3720ed
f607fe3750a01bf778c72f67feedeabac50e39e1
f5ef789c9faa54e39fdf5392eb072f6f39fd6cab
f562348d01bde3e3d4af3ebdf6cd74121222ad3e
f30fe1945291dd09770a0886c0f984e0d7e44850
f269ddffa7a741c879d712d7009a112402aaa0b2
f0edb016733e67cda8d0bdf60ed036c90dc5dc4d
ec1408f8cfb118ab3f0a2c8ffe411f5bf2f94091
ebc0863d9b5296ba6f923eb784872c4b2ae26a36
e6868b55afbc3279ae4cd81ae9a9528ac2063b99
e5ba4839853c118e20fd59ec99216d64548accc3
e46a78ef1ac84a0a5ff81fec20c1c4bb1a882eab
dfd3cb8070999ddc09e87d1603bbdc0bb79c34f5
df1c7a2b6e79b4739b35dfae7f6294d26365fe28
ded15a2c5b75b8ff1256e35c0d6f270f9bc0ec3e
de355b70f27a6d6a899daf17a5fa98b7ad6a4f4f
db497b95c79e41212577db0ba06777b62db209ff
dad124d9700e973dd9a7f654fe03783b43264cd8
d9e452495d6d90465a3bbec3cad5ec921242e21e
d6a29e373bb094cdc5ff9d403f5791024ca559bb
d442065cd24ee151b2890b214ae09d1dc76c5011
d32e44f7e04a8c84e7159ed020dcf26b6e51416e
ce043b1a6906a69aa1a82bfbbedda53fb86205d1
cb41d4512b2ecedda63b2c273e5af15a8dd90da1
cb2ca7306b8df952a4135b1f3c0b29b82a85a065
c6497099760d5badb5b2bf800bf8d502b486f36d
c5dbae856d81bb1c1df14160db219158e3a045a1
c4b7d00b14abb3b7c98cdcd50e95332959909784
c420f58eb9822a8550b37ec33175b0e88d18ab44
c3742b6251c5ac1769767c550a8a89b156898375
bcc5f688ffbde19923c90a61e12f1bc4d8094f5b
ba1a39bcedd7ddc7f069e96e220035d5c4844d32
b95c516bce5ff142acbe27db112d2e7e07fce3f8
b77875ba47716cc7f05ec86c02467b486c222563
b2cc8f434e6fb012dbdae89d7c8b1d8ea95a7ad3
b075ae2ecd30f9716911c707e2dbdcc261c9735e
afec262477d24c9bd40fa3aad3a8a2fa4900e4bd
abc6420dab7630472cb1d6e0a2619f19e007962f
ab72e3c2c6b7ee7c6d075a120d8a867091158478
aa644941c54bf7e76ff20ba6fc208c176ed865a0
aa54013aeb502b4a936331deb76a6411f1f1ade7
aa4bf9c81235757291517154d9884b57eaa3bd4b
a839f034fca187c7f7ab9a68c9b24a45e7a3ea40
a6699abff7b82cd1d25ec704ee2258a671816b00
a61bfc3b133116463d6a8fc43e0f0d3e781589ee
a3c0d50d743a0b6aeff4db45e8ca2c1c708156d5
a3a791a550bc6cedaf8d9f654137b5ff6fa562e7
a23f991ebffff8e534e65495793618310457eed0
9e24c4e231b93142419ac20e58dd71388f7d8ab7
9d7da836b2374f95ea647bf1c33fa26d279ffd5c
9bcb241f07654ecefaf58aca39e44fa0790c4668
9aa3e3b4374693f6ae972494b9589b5b97fe39c5
9a2255123befedc1932f22feed1cc26e245f158a
988fc0d23e6e30c2c46ccec9bbff50b7453b8ba9
97efc80a2e771a20fe00d67d7883323a446c38dc
97e360b73616b8a4acf253eb5979958c65e96e76
96b24cfafc899c611fbf10cd71c2ea164d494498
96171852a5f058519de4c5f26057da4a09a36ce8
95d4b880698accfff08734644600c93f2a104c74
959da0fb174a8e4db238d08a3f5076a2f43c0f25
9468012acf6df7a0e593f41e0da8123f541277df
919c33adb648ce13ee8bd7c11bffbfd836936c00
9084f80c81c320dc696b0e134c34778ff21ef5e0
8ec6dd9509451e038c883b8ddf8f43706b93f901
8e98f5ffeebbf4c2101a2d1f80d3b2f5b2a2b779
8d7ce314adb046f98f1d0abfb8e951884de183da
8af8c027cb0f56b6775115383f4d5bdf010a6352
892f2bd2f7582a6a8a98bc5e8c3876f6ec7a5af0
88ae66f949e2ee06890f4ded031cb5bb1db36c10
84e388acc4c32e2e0aa754902bb0931cbd4cc4ee
829401a6d4061bd41dc07a56005f80a05c46a732
80a973c3da41c6479cc9d7036090adc1264c02a4
7b076fecb16a343cb488d034a2807b9e264616f0
7af4b47c19a433a77c8060e928853464433cd3d6
79ce29609ca633f7ab3fd9cecf147a8ba58ba6a8
78b8c5e115da2838db31f7313eee0fb3b02f3f91
78227f3a159478bd377add728d206675aa3963a6
77e869d2cdb86aea090f14a444e0d1ee39e5cd68
76053ee8c572b2cae49843ff6450fe2b75f0e4ec
717901e4fdbe9a3e69aacec943e3fef9f6fe880e
6fe84c129f76d309032e26aba3c33ba0b64172e8
6f63cfd1239b97fa6e51bda2cbfeb75d7ef8c558
6dacf7e2b65ed65fc5fb132c9fdc483620a29806
6ce0a97038ee51dc579409eb33c3e370f200c047
6acfbb3c2ea50fd90c2d4f75e2f3ac7f6564487e
69e837896d501bd8dc2bc9043421cdd2f75478a9
68bee72acfd5371b1122490bd072228ceb672cef
67aacef9422498071ed7395fdd2cd0538e2c9fee
66aff0c5f1bd49cbf08a427b4764ca6e9ef5785e
66303b6eae62c18556d18012d5e7dead0c7c7b3a
62f8788e8fac62d0faf75c5debdf8375f272609e
613caff760da9b0f5d2f948bf2cd1d6f046cd005
6072dffc994f5ab22a4b7320d9caba21b137b34b
5f080d7290fdf743e1392991124b722a7c6921ff
5e75c057e25c43d0cf003088abc1c3468f917867
5da94b438de46224200d89510121e2ef0f637015
5d430461fa3aabc094e3db9e91b69f703b9e94cb
5a59f2ef0e4b7adbc0780748063d5cee64f8a1a6
57d2f9cc6f11cdffde757fac79fe398192364c17
5788c6ce7f3a9a28e55b137a51b761bd6c4fc40c
56af94995d5336302c86fc492afd3969c4eb33c8
5658a84dbc703aac52e4df4c9912572b322cd62a
54d3d706d65e3d529cf81eadacbbd5b8de4cb43a
54cee4272bbd4bdd774214f76143331f374201ed
4db627cff2af5de1f7ceec1ad1125a4a9dcefdab
4da6fef533b37a12ed1e357df66802de29c1ab5c
4d74de5d8a269eb22bdc2ab3563d7fd4f819d1a9
4b03914c7cbb4bc61e6097846e3cc49bad153140
4975bcdee32d06a04701f578d0a38d7ed7614ed3
44409df06ee5d7a95c18a4823f52e10fa75afaa5
41c37321b305f05c38c61e7423216e4b42f9a4bf
40122f34140303cef9883d73ba69e53ccf39d6c0
3f4ad39c829f9ee919a6304faf439000686f93e2
3dd1b9f3dc6fc02af5919453d22d635c251998a9
3c92dc7f262b8261e25580397038b1704d8c3309
3758f502cdfda460b72b74ecd39c9e509955df6e
3699d1e8d42e18cd40c81daf683fe9feb32e7331
3676e7009f6860667d6aa43810a8161b218dc15d
35c3e82d8c15b8a95aaca126779b61b16a703690
357419f9f553b44d84f05f8426f7123305fc7535
327847bcece765728abb142b482bafdc5442cc58
2eda4e6246f9dcb28b7886d9731a478d818884d7
2d3bc2856c015914f2856331a0315298f3c34b0c
2d0e694de0833b228722228ef7520d553db35ff5
2be1be4d8781d29c9fa49720408769d14864b087
2bbc7301056a3479106c53e0f131cfda6836bd23
2b7aec03db17f9a274bc4a18a8e1f07d5cbe9ff1
2a232f2522da3fe7089d46a634741d29826520cf
29fcae649c1421dccd0bdf253869257d633052ee
29aef3c31e2371e1572b54a10c66b2ecd5d4dc02
289f9fba2266eb0479899f30c54e1f8bff3e3467
287f1058a3272acf3075777ef523d1d9a93b34a3
287dca5b16df751bfb0bcf0c33a01bb384fc7ca5
286c1ad277a337938d6b962d036969eeafe449e6
26ab576a0abf7085ecf6321a311a7b3088ee48ae
23e0ca5808d3d3c3e4d9a3b5a9c012488d0abb28
21d92fb5aa818f9e4c4f17287630c17e47c3cb23
2055f2597dc75bb7ad444ad5a307360d372569e0
1e2e8860d5f7a73f921f6bc4e4247bcc2ed2afa3
1b159fbbb46b796af684b9aa012abac5efbfa64d
12b3b7b9ff68d1cb406f41cb352e8b82a01a7689
125f0459d0ad317da34e2d3301ae460844183fe5
0dd27a3e30b3cbacf337c6ac0e460bded7162415
0daae99f60eb00b2353a5e5194b3d3c01f9bf176
0caff508627beadb48a3c662f0f476e03c085604
0bb88b80294f3f13570b3b1f074b14a9cc7fa260
0a6e4a9bc84ae988f2a3d2d41816cf29dff5f46d
06e0c9440ccd755c2613ace21447841f0fbb4e2e
Purpose Built to Prevent Tomorrow’s Threats. Today.
Your most sensitive data lives on the endpoint and in the cloud. Protect what matters most from cyberattacks. Fortify every edge of the network with realtime autonomous protection.