Threat Actor Characterization
Black Basta
ID: be2d92671123880549ac2c1b86e4baa179236| BlackBasta | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Black Basta is a ransomware-as-a-service (RaaS) ecosystem described in public reporting as using social engineering (including Teams/vishing and remote assistance abuse), legitimate remote management tooling, credential theft, hands-on-keyboard activity, data theft for extortion, and ransomware encryption for impact. Affiliates’ methods evolve; treat infrastructure indicators as time-bounded and emphasize behavior-first detection.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1036 | Masquerading | TA0005 |
|
| T1543.003 | Windows Service | TA0003 TA0004 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1003 | OS Credential Dumping | TA0006 |
|
| T1087 | Account Discovery | TA0007 |
|
| T1046 | Network Service Discovery | TA0007 |
|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1047 | Windows Management Instrumentation | TA0002 |
|
| T1560 | Archive Collected Data | TA0009 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
| T1490 | Inhibit System Recovery | TA0040 |
|
Black Basta
Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE
Category: Ransomware / RaaS (crimeware ecosystem)
Author: 3C-INT Analyst
Executive Summary
Black Basta is a Russian-speaking ransomware operation that emerged publicly in 2022 and has been widely reported as connected to the broader post-Conti crimeware ecosystem. Public reporting indicates the group operated a double-extortion model (data theft plus encryption) and relied on a multi-party ecosystem of initial access, tooling, hosting, and financial infrastructure.
In February–March 2025, large volumes of internal chat logs from a Matrix server were leaked publicly, providing visibility into operational tradecraft and third-party dependencies. Multiple analyses argue that the leak and upstream disruptions to access channels (e.g., QakBot-related disruption in 2023) contributed to fragmentation and affiliate migration rather than a clean “shutdown”.
- Operating model: RaaS-style ecosystem (operators + affiliates / brokers). INFERENCE (confidence: high): The group’s pace, victim selection, and tooling mix align with a structured ransomware enterprise rather than a single small crew.
- Language / origin signals: Public reporting consistently describes the core as Russian-speaking and connected to the post-Conti/Ryuk ecosystem.