New Report / The State of Cybercrime 2024 Report

Read Here

Resource

KELA REPORT

Inside the Black
Basta Leak: How
Ransomware
Operators Gain
Access

In this report – understand how attackers operate and how you can strengthen your defenses.

A major leak has exposed Black Basta’s internal tactics, revealing how ransomware operators infiltrate victims using stolen credentials and remote access tools.


Key insights from the report:

  • Top five access and lateral movement tactics used by Black Basta
  • Infostealer malware logs as a primary source of stolen credentials
  • A real-world attack case showing step-by-step ransomware deployment

Download the full report to uncover critical security insights and actionable defense strategies.

 

Download the Report