A week ago I read a post from Alon Gal (Co-Founder & CTO) at Hudson Rock noting that they had created BlackBastaGPT, from the Black Basta Ransomware group’s ~1 Million leaked internal chat messages, encouraging ITsec pros to dive into Black Basta’s internal chats. Over the last few days, I have been doing just that to see what insights I could uncover that might help security blue teams proactively defend against ransomware threats and build better response strategies.
Kudos to Alon Gal and the whole Hudson Rock team for acting so quickly to create BlackBastaGPT 🙌
Also, in case you have not done so check out their CavalierGPT for delving into infostealer data (ranked #1 for OSINT in the GPT store 🥳).
Black Basta actively searched for and exfiltrated sensitive data. Their methods for defining and acquiring valuable data included:
Why? Business reports can reveal corporate strategies, M&A plans, and sensitive financial data useful for extortion or insider trading.
These files were prioritised for exfiltration.
5. File searches by name & type: They performed searches for specific file extensions such as .docx, .msg, .zip, and .tar. They scanned entire folder structures and applied metadata filtering for documents containing financial or HR-related terms. They requested file trees to select high-value files efficiently, which suggests automated directory mapping:
This indicates structured directory mapping to locate sensitive files and confirms they prioritised targeted file selection.
Why? Email logs can contain confidential discussions, financial transactions and sometimes even credentials. This is where they focused their searches:
These files were likely used for extortion, insider threats or data resale on underground forums.
They focused on corporate storage solutions and communication platforms, actively targeted multiple data stores, including SMB file shares, Microsoft Teams, OneDrive, SharePoint and Exchange Online.
Data stores targeted and the attack methods used:
1. SMB File Shares (Windows Network Shares): They extensively mapped SMB shares across multiple systems, accessed critical shared folders, including:
They leveraged credentials to escalate access to these shares.
2. Microsoft Teams
These were linked to SOCKS proxies, suggesting potential use for persistent access or lateral movement.
3. Microsoft OneDrive & SharePoint:
This implies they gathered email lists, tested Teams logins, and sent phishing emails targeting SharePoint credentials.
Suggests that instead of using suspicious domains, they used trusted SharePoint links for phishing, making it harder for security tools to flag their attacks.
4. Microsoft Exchange Online (Email Servers)
“это с эксплойта по клику, креды которые сейчас добываем с экчейнжей” - This is from an exploit by clicking, the credits that we now extract from exchanges.
Top targeted data stores (ranked by frequency of targeting):
Black Basta concentrated on data stores that contained valuable corporate, legal, financial and HR information. They used stolen credentials, phishing, SMB enumeration, and Exchange exploits to gain access. Their focus suggests a strategy of exfiltrating high-value data for ransom and extortion.
This suggests that organisations should focus security efforts on securing SMB file shares, cloud storage, and email systems to prevent data theft.
They leveraged stolen credentials to get to the data
This suggests they were leveraging valid accounts for persistence and lateral movement.
Once they got to the data they exfiltrated it, deployed ransomware, and extorted their victims
"We've downloaded over 1.5 TB of sensitive information and data from your network... if we do not come to an agreement within 10 days, all of your data will be posted on our news board."
This implies they automated the process of scanning and extracting targeted data.
Black Basta relied on privilege escalation, MFA bypass, lateral movement, and log evasion to exploit access controls. Their focus on gaining admin rights, abusing misconfigured permissions, and targeting VPN/firewall vulnerabilities allowed them to maintain persistence and execute ransomware effectively.
Black Basta conducted highly targeted searches across organisations, focusing on legal, financial, and HR related data. They leveraged phishing, stolen credentials, and permission testing to access SharePoint links and other restricted data stores. By using automated scripts, directory mapping, and keyword-based searches, they efficiently extracted and filtered sensitive files based on metadata and file types to maximise their value. Their operations combined advanced reconnaissance, access control exploitation, and credential theft with technical exploits, social engineering, and extortion tactics. This strategic approach enabled them to infiltrate networks deeply, exfiltrate high-value corporate data, and execute ransomware extortion, corporate espionage, and financial fraud.
The Black Basta leak has provided a comprehensive view of the tactics, techniques, and procedures (TTPs) employed by the threat actors. The analysis reveals a structured attack chain that leverages credential theft, malware execution, and ransomware deployment while ensuring persistence through proxies and tunnelling.
By implementing these recommendations, organisations can enhance their security posture and mitigate the risks associated with data breaches and cyber-attacks.
Lorem ipsum dolor sit amet, consectetur adipiscing elit lobortis arcu enim urna adipiscing praesent velit viverra sit semper lorem eu cursus vel hendrerit elementum morbi curabitur etiam nibh justo, lorem aliquet donec sed sit mi dignissim at ante massa mattis.
Vitae congue eu consequat ac felis placerat vestibulum lectus mauris ultrices cursus sit amet dictum sit amet justo donec enim diam porttitor lacus luctus accumsan tortor posuere praesent tristique magna sit amet purus gravida quis blandit turpis.
At risus viverra adipiscing at in tellus integer feugiat nisl pretium fusce id velit ut tortor sagittis orci a scelerisque purus semper eget at lectus urna duis convallis porta nibh venenatis cras sed felis eget neque laoreet suspendisse interdum consectetur libero id faucibus nisl donec pretium vulputate sapien nec sagittis aliquam nunc lobortis mattis aliquam faucibus purus in.
Nisi quis eleifend quam adipiscing vitae aliquet bibendum enim facilisis gravida neque euismod in pellentesque massa placerat volutpat lacus laoreet non curabitur gravida odio aenean sed adipiscing diam donec adipiscing tristique risus amet est placerat in egestas erat.
“Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua enim ad minim veniam.”
Eget lorem dolor sed viverra ipsum nunc aliquet bibendum felis donec et odio pellentesque diam volutpat commodo sed egestas aliquam sem fringilla ut morbi tincidunt augue interdum velit euismod eu tincidunt tortor aliquam nulla facilisi aenean sed adipiscing diam donec adipiscing ut lectus arcu bibendum at varius vel pharetra nibh venenatis cras sed felis eget.