- Gone Phishing
- Posts
- Black Basta ransomware inner workings
Black Basta ransomware inner workings

Welcome to Gone Phishing, your weekly cybersecurity newsletter thatโs wants to gut cybercrime like Elonโs gutting Americaโs federal government #DOGE ๐๐๐
Patch of the Week! ๐ฉน
First thingโs first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโs itโฆ ๐ณ
Congrats to CISA, the cybercriminals are no matchโฆ for your patch! ๐ฉน
Check out this freshly hatched patch ๐ฃ

Time for hackers to CISA and desist โ๐ป๐โ๏ธ
๐จ CISA Adds Microsoft & Zimbra Flaws to KEV List โ Patch Now! ๐ง
CISA has flagged two actively exploited security flaws in Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) in its Known Exploited Vulnerabilities (KEV) catalog. ๐จ
โก The Vulnerabilities:
1๏ธโฃ CVE-2024-49035 (CVSS 8.7) โ Microsoft Partner Center
Privilege escalation flaw allowing attackers to gain higher access.
Patched in November 2024 โ Update ASAP!
2๏ธโฃ CVE-2023-34192 (CVSS 9.0) โ Zimbra ZCS
Cross-Site Scripting (XSS) flaw lets attackers inject malicious scripts.
Fixed in July 2023 (Version 8.8.15 Patch 40).
๐ง Immediate Action Required!
โ Federal agencies must patch by March 18, 2025.
โ If you use Zimbra or Microsoft Partner Center, update immediately!
โ ๏ธ No public exploit details available, but donโt waitโthese flaws are already being used in the wild! Stay secure! ๐โจ
Now, on to this weekโs hottest cybersecurity news stories:
๐ฆ Leaked: Black Basta ransomware inner workings. Strap in โ
โ ๏ธ BEWARE: 5 ACTIVE malware campaigns in Q1 2025 ๐
๐จ๐ปโ๐ป Hackers access compromised Linex systems w/ new malware ๐พ
Oi, you Black Basta - WOAH, easy whoโs naming these things, Nick Griffin?! ๐

Gif by snl on Giphy
๐จ Black Basta Ransomware Gangโs Internal Chats Leaked! ๐ต๏ธโโ๏ธ
A massive leak of over 200,000 internal chat messages from the Black Basta ransomware gang has exposed their tactics, conflicts, and key members. The leak, spanning Sept 2023 โ Sept 2024, was published by a mysterious figure, ExploitWhispers, who claimed they did it because Black Basta targeted Russian banks.
๐ฅ Key Takeaways from the Leak
๐น Infighting & Betrayal โ Some members scammed victims by taking ransom payments without providing a decryptor ๐ฐ๐ซ
๐น Major Defections โ Top members have moved to rival ransomware groups CACTUS & Akira
๐น 17-Year-Old Hacker? โ A minor is allegedly part of Black Bastaโs operations ๐ฑ
๐น New Focus on Social Engineering โ Inspired by Scattered Spiderโs tactics ๐ญ
๐น Exploits & Initial Access โ They target weak RDP, default VPN credentials, and SMB misconfigurations to break into networks ๐
๐ฐ Black Bastaโs Impact
โ ๏ธ 500+ victims across North America, Europe, & Australia
โ ๏ธ At least $107M in ransom payments in Bitcoin since 2022 ๐ต
โ ๏ธ Uses malware droppers & legit file-sharing platforms (transfer.sh, temp.sh) to evade detection ๐ต๏ธโโ๏ธ
๐ Ransomware Moves Faster Than Ever
๐ข Once inside, Black Basta can take over a network in minutes! Cybersecurity experts warn that attackers no longer waste time once they breach an organization.
๐ Ransomware Surge Continues
Meanwhile, other major ransomware gangs like Cl0p & Ghost are ramping up attacks:
๐น Cl0p exploits new vulnerabilities (CVE-2024-50623) to breach organizations ๐
๐น Ghost actors (China-based) attack critical infrastructure, schools, healthcare, and businesses using old exploits ๐ดโโ ๏ธ
๐ How to Stay Protected
โ Patch vulnerabilities & secure RDP/VPN access ๐
โ Monitor for unusual file-sharing traffic ๐ง
โ Educate employees about phishing/social engineering ๐ง
โ Have a ransomware response plan in place ๐จ
The ransomware ecosystem is shiftingโbut leaks like these expose their inner workings and help defenders fight back! ๐ฅ

Tired of Spam Messages, Scam Calls, and Phishing Attempts? You Need to Address the Root Cause.
Tech companies and data brokers profit off of your personal information. This makes you vulnerable to spam, fraud, and phishing attempts. Cloaked searches you across 120+ data brokers to remove your info. And then, generate unlimited email IDs, phone numbers to stand in place of your real identity.

Sweet home MALalabama ๐ก๐พ๐
๐จ Cyber Threats in Q1 2025: Key Malware Families & Tactics โ๏ธ
The first quarter of 2025 saw aggressive new malware campaigns, with cybercriminals refining their attack techniques. Here are five major threats identified so far:
๐ฅ๏ธ NetSupport RAT โ Remote Control via Fake CAPTCHAs
Cybercriminals used ClickFix attacks to deliver NetSupport RAT by injecting fake CAPTCHA pages into compromised sites. Victims unknowingly executed malicious PowerShell commands, granting attackers:
๐น Full remote access to their systems
๐น Keystroke logging & credential theft
๐น Persistent system modifications for stealth
๐ฐ Lynx Ransomware โ Expanding Ransomware-as-a-Service
Lynx RaaS has rapidly grown, targeting businesses worldwide with:
๐น 80% revenue share for affiliates ๐ต
๐น Data theft before encryption for double extortion ๐
๐น Recent attacks on law firms & truck dealerships ๐
๐ต๏ธ AsyncRAT โ Phishing with TryCloudflare Tunnels
Attackers deployed Python payloads via Dropbox phishing links, hiding AsyncRAT inside:
๐น LNK shortcuts & PowerShell scripts
๐น Encrypted communications for stealth
๐น Credential theft & persistent access
๐ Lumma Stealer โ Hiding in GitHub Releases
Cybercriminals abused GitHub to distribute Lumma Stealer, which:
๐น Steals browser credentials, cookies, and crypto wallets
๐น Delivers additional malware (Vidar, Cobeacon)
๐น Uses registry modifications to maintain access
๐ญ InvisibleFerret โ Fake Job Scams Targeting Professionals
Disguised as legitimate software in fake job interviews, InvisibleFerret:
๐น Steals sensitive data & source code
๐น Blends malicious traffic with normal activity
๐น Uses advanced obfuscation to avoid detection
๐ Stay Safe!
โ Avoid unknown links & downloads
โ Monitor network traffic for suspicious activity
โ Keep software & security tools updated
Cybercriminals are getting smarterโstaying informed is the first step to staying secure! ๐จ

Hiring around the world? Get the guide to global hiring.
With Deelโs Business Case for Global Hiring Guide, youโll discover how to overcome the most common global hiring challenges and what route works best for your expanding workforce.

Auto-Color me shocked ๐
๐จ Auto-Color: Stealthy Linux Malware Targeting Universities & Government Orgs ๐๏ธ
A new Linux malware, Auto-Color, has been found targeting universities and government agencies in North America and Asia between November and December 2024. It grants full remote access to infected machines, making it extremely difficult to remove.
๐ญ How Auto-Color Evades Detection
๐น Uses harmless-looking file names (e.g., door, egg) ๐ฅ
๐น Hides C2 communications by modifying /proc/net/tcp ๐ก
๐น Deploys a malicious library (libcext.so.2) for persistence ๐ ๏ธ
๐น Protects /etc/ld.preload to block removal ๐ซ
๐ฅ How It Works
1๏ธโฃ Requires manual execution on a Linux machine
2๏ธโฃ If launched as root, it installs itself in /var/log/cross/auto-color ๐
3๏ธโฃ Hooks into system calls to hide activity ๐
4๏ธโฃ Contacts a C2 server to receive remote commands ๐
๐ต๏ธ What Attackers Can Do
โ Spawn a reverse shell for remote access
โ Modify, create, or delete files ๐
โ Gather system information ๐
โ Turn the infected machine into a proxy ๐
โ Uninstall itself with a built-in kill switch ๐ช
๐ How to Stay Safe
๐จ Avoid running unverified executables
๐ Monitor /etc/ld.preload for unauthorized modifications
๐ก๏ธ Use endpoint security to detect unusual network activity
Auto-Color is stealthy, persistent, and highly evasiveโmaking vigilance key to defense! ๐ง

๐๏ธ Extra, Extra! Read all about it! ๐๏ธ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
๐ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐
๐ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐
๐Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐พ
Let us know what you think.
So long and thanks for reading all the phish!
Give us a rating? |


