Inside the Black Basta Leak: How Ransomware Operators Gain Access | KELA Cyber

New Report / The State of Cybercrime 2024 Report

Read Here

In this article

Inside the Black Basta Leak: How Ransomware Operators Gain Access

a black and red logo with the word kela on it
By KELA Cyber Team
a man in a blue suit and white shirt
Edited by Ben Kapon

Updated February 27, 2025.

a skull with the words, inside the black boston leak how ransomware operators gain

A major leak has exposed the inner workings of Black Basta, one of the most active כransomware groups, offering a rare glimpse into how these cybercriminals infiltrate and exploit their victims. KELA conducted an in-depth analysis of the leaked data, uncovering key tactics and operational details used by the group. KELA’s latest report breaks down the top five initial access and lateral movement vectors used by Black Basta, including specific remote access solutions, revealing crucial insights for cybersecurity professionals.

What’s Inside the Leak?

The leaked internal chats provide intelligence on compromised credentials and attack strategies, highlighting how Black Basta gains unauthorized access. One key revelation? Many of these credentials appear to originate from infostealer malware logs, showing just how critical credential security is in preventing attacks.

A Real-World Attack Case

The report includes an in-depth case study of a Brazil-based company targeted by Black Basta. The attack began with stolen credentials—leaked months earlier via infostealer malware logs on cybercrime platforms—leading to full network compromise, ransomware deployment, and public extortion.

Key Takeaways for Organizations

  • Secure remote access: Restrict RDP access and enforce MFA.
  • Monitor leaked credentials: Threat intelligence can help detect stolen login details before attackers use them.
  • Harden defenses: Patch vulnerabilities and implement incident response plans.