Black Basta ransomware inner workings

In partnership with

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter thatโ€™s wants to gut cybercrime like Elonโ€™s gutting Americaโ€™s federal government #DOGE ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚

Patch of the Week! ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ 

Congrats to CISA, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patch ๐Ÿฃ

Time for hackers to CISA and desist โœ‹๐Ÿป๐Ÿ›‘โ›”๏ธ

๐Ÿšจ CISA Adds Microsoft & Zimbra Flaws to KEV List โ€“ Patch Now! ๐Ÿ”ง

CISA has flagged two actively exploited security flaws in Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) in its Known Exploited Vulnerabilities (KEV) catalog. ๐Ÿšจ

โšก The Vulnerabilities:

1๏ธโƒฃ CVE-2024-49035 (CVSS 8.7) โ€“ Microsoft Partner Center

Privilege escalation flaw allowing attackers to gain higher access.

Patched in November 2024 โ€“ Update ASAP!

2๏ธโƒฃ CVE-2023-34192 (CVSS 9.0) โ€“ Zimbra ZCS

Cross-Site Scripting (XSS) flaw lets attackers inject malicious scripts.

Fixed in July 2023 (Version 8.8.15 Patch 40).

๐Ÿ”ง Immediate Action Required!

โœ… Federal agencies must patch by March 18, 2025.

โœ… If you use Zimbra or Microsoft Partner Center, update immediately!

โš ๏ธ No public exploit details available, but donโ€™t waitโ€”these flaws are already being used in the wild! Stay secure! ๐Ÿ”’โœจ

Now, on to this weekโ€™s hottest cybersecurity news stories: 

  • ๐Ÿ’ฆ Leaked: Black Basta ransomware inner workings. Strap in โ˜•

  • โš ๏ธ BEWARE: 5 ACTIVE malware campaigns in Q1 2025 ๐Ÿ“…

  • ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Hackers access compromised Linex systems w/ new malware ๐Ÿ‘พ

Oi, you Black Basta - WOAH, easy whoโ€™s naming these things, Nick Griffin?! ๐Ÿ’€

Kenan Thompson Eating GIF by Saturday Night Live

Gif by snl on Giphy

๐Ÿšจ Black Basta Ransomware Gangโ€™s Internal Chats Leaked! ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A massive leak of over 200,000 internal chat messages from the Black Basta ransomware gang has exposed their tactics, conflicts, and key members. The leak, spanning Sept 2023 โ€“ Sept 2024, was published by a mysterious figure, ExploitWhispers, who claimed they did it because Black Basta targeted Russian banks.

๐Ÿ”ฅ Key Takeaways from the Leak

๐Ÿ”น Infighting & Betrayal โ€“ Some members scammed victims by taking ransom payments without providing a decryptor ๐Ÿ’ฐ๐Ÿšซ

๐Ÿ”น Major Defections โ€“ Top members have moved to rival ransomware groups CACTUS & Akira

๐Ÿ”น 17-Year-Old Hacker? โ€“ A minor is allegedly part of Black Bastaโ€™s operations ๐Ÿ˜ฑ

๐Ÿ”น New Focus on Social Engineering โ€“ Inspired by Scattered Spiderโ€™s tactics ๐ŸŽญ

๐Ÿ”น Exploits & Initial Access โ€“ They target weak RDP, default VPN credentials, and SMB misconfigurations to break into networks ๐Ÿ”“

๐Ÿ’ฐ Black Bastaโ€™s Impact

โš ๏ธ 500+ victims across North America, Europe, & Australia

โš ๏ธ At least $107M in ransom payments in Bitcoin since 2022 ๐Ÿ’ต

โš ๏ธ Uses malware droppers & legit file-sharing platforms (transfer.sh, temp.sh) to evade detection ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ›‘ Ransomware Moves Faster Than Ever

๐Ÿ“ข Once inside, Black Basta can take over a network in minutes! Cybersecurity experts warn that attackers no longer waste time once they breach an organization.

๐ŸŒ Ransomware Surge Continues

Meanwhile, other major ransomware gangs like Cl0p & Ghost are ramping up attacks:

๐Ÿ”น Cl0p exploits new vulnerabilities (CVE-2024-50623) to breach organizations ๐Ÿ”“

๐Ÿ”น Ghost actors (China-based) attack critical infrastructure, schools, healthcare, and businesses using old exploits ๐Ÿดโ€โ˜ ๏ธ

๐Ÿ” How to Stay Protected

โœ… Patch vulnerabilities & secure RDP/VPN access ๐Ÿ”„

โœ… Monitor for unusual file-sharing traffic ๐Ÿง

โœ… Educate employees about phishing/social engineering ๐Ÿ“ง

โœ… Have a ransomware response plan in place ๐Ÿšจ

The ransomware ecosystem is shiftingโ€”but leaks like these expose their inner workings and help defenders fight back! ๐Ÿ”ฅ

Tired of Spam Messages, Scam Calls, and Phishing Attempts? You Need to Address the Root Cause.

Tech companies and data brokers profit off of your personal information. This makes you vulnerable to spam, fraud, and phishing attempts. Cloaked searches you across 120+ data brokers to remove your info. And then, generate unlimited email IDs, phone numbers to stand in place of your real identity.

Sweet home MALalabama ๐Ÿก๐Ÿ‘พ๐Ÿ’€

๐Ÿšจ Cyber Threats in Q1 2025: Key Malware Families & Tactics โ™Ÿ๏ธ

The first quarter of 2025 saw aggressive new malware campaigns, with cybercriminals refining their attack techniques. Here are five major threats identified so far:

๐Ÿ–ฅ๏ธ NetSupport RAT โ€“ Remote Control via Fake CAPTCHAs

Cybercriminals used ClickFix attacks to deliver NetSupport RAT by injecting fake CAPTCHA pages into compromised sites. Victims unknowingly executed malicious PowerShell commands, granting attackers:

๐Ÿ”น Full remote access to their systems

๐Ÿ”น Keystroke logging & credential theft

๐Ÿ”น Persistent system modifications for stealth

๐Ÿ’ฐ Lynx Ransomware โ€“ Expanding Ransomware-as-a-Service

Lynx RaaS has rapidly grown, targeting businesses worldwide with:

๐Ÿ”น 80% revenue share for affiliates ๐Ÿ’ต

๐Ÿ”น Data theft before encryption for double extortion ๐Ÿ”

๐Ÿ”น Recent attacks on law firms & truck dealerships ๐Ÿš›

๐Ÿ•ต๏ธ AsyncRAT โ€“ Phishing with TryCloudflare Tunnels

Attackers deployed Python payloads via Dropbox phishing links, hiding AsyncRAT inside:

๐Ÿ”น LNK shortcuts & PowerShell scripts

๐Ÿ”น Encrypted communications for stealth

๐Ÿ”น Credential theft & persistent access

๐Ÿ›‘ Lumma Stealer โ€“ Hiding in GitHub Releases

Cybercriminals abused GitHub to distribute Lumma Stealer, which:

๐Ÿ”น Steals browser credentials, cookies, and crypto wallets

๐Ÿ”น Delivers additional malware (Vidar, Cobeacon)

๐Ÿ”น Uses registry modifications to maintain access

๐ŸŽญ InvisibleFerret โ€“ Fake Job Scams Targeting Professionals

Disguised as legitimate software in fake job interviews, InvisibleFerret:

๐Ÿ”น Steals sensitive data & source code

๐Ÿ”น Blends malicious traffic with normal activity

๐Ÿ”น Uses advanced obfuscation to avoid detection

๐Ÿ” Stay Safe!

โœ… Avoid unknown links & downloads

โœ… Monitor network traffic for suspicious activity

โœ… Keep software & security tools updated

Cybercriminals are getting smarterโ€”staying informed is the first step to staying secure! ๐Ÿšจ

Hiring around the world? Get the guide to global hiring.

With Deelโ€™s Business Case for Global Hiring Guide, youโ€™ll discover how to overcome the most common global hiring challenges and what route works best for your expanding workforce.

Auto-Color me shocked ๐Ÿ˜

๐Ÿšจ Auto-Color: Stealthy Linux Malware Targeting Universities & Government Orgs ๐Ÿ›๏ธ

A new Linux malware, Auto-Color, has been found targeting universities and government agencies in North America and Asia between November and December 2024. It grants full remote access to infected machines, making it extremely difficult to remove.

๐ŸŽญ How Auto-Color Evades Detection

๐Ÿ”น Uses harmless-looking file names (e.g., door, egg) ๐Ÿฅš

๐Ÿ”น Hides C2 communications by modifying /proc/net/tcp ๐Ÿ“ก

๐Ÿ”น Deploys a malicious library (libcext.so.2) for persistence ๐Ÿ› ๏ธ

๐Ÿ”น Protects /etc/ld.preload to block removal ๐Ÿšซ

๐Ÿ”ฅ How It Works

1๏ธโƒฃ Requires manual execution on a Linux machine

2๏ธโƒฃ If launched as root, it installs itself in /var/log/cross/auto-color ๐Ÿ“

3๏ธโƒฃ Hooks into system calls to hide activity ๐Ÿ”

4๏ธโƒฃ Contacts a C2 server to receive remote commands ๐Ÿ”—

๐Ÿ•ต๏ธ What Attackers Can Do

โŒ Spawn a reverse shell for remote access

โŒ Modify, create, or delete files ๐Ÿ“

โŒ Gather system information ๐Ÿ“Š

โŒ Turn the infected machine into a proxy ๐ŸŒ

โŒ Uninstall itself with a built-in kill switch ๐Ÿ”ช

๐Ÿ” How to Stay Safe

๐Ÿšจ Avoid running unverified executables

๐Ÿ”„ Monitor /etc/ld.preload for unauthorized modifications

๐Ÿ›ก๏ธ Use endpoint security to detect unusual network activity

Auto-Color is stealthy, persistent, and highly evasiveโ€”making vigilance key to defense! ๐Ÿšง

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

Give us a rating?

Login or Subscribe to participate in polls.

footer graphic cyber security newsletter