DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Black Basta exposed: A look at a cybercrime data leak and a key member, “Tramp”

Posted on March 2, 2025March 2, 2025 by Dissent

Intel471 reports:

On Feb. 11, 2025, a mysterious leaker going by the Telegram username ExploitWhispers released one year’s worth of internal communications between members of the Black Basta ransomware group on a Telegram channel. Black Basta is still active in a reduced capacity, but in 2022, it was the third most impactful ransomware group. Its members appeared to be experienced Russian-speaking ransomware and cybercrime veterans, some of whom worked with the infamous Contiransomware-as-a-service (RaaS) group. The 197,000 chat messages are drawn from 80 different chatrooms on Matrix servers hosting on six domains. The leak rivals the chat leak that affected Conti ransomware gangin late February 2022. Black Basta’s leak provides similar insight as Conti’s: Black Basta is a polished ransomware group that carefully studied potential victims, ran sophisticated phishing and malware campaigns and employed a range of people for support, including call services, malware development, initial access, crypters and penetration testing. The messages reveal a range of technical data that formed Black Basta’s operations, including cryptocurrency wallets, domain names, indicators of compromise (IoCs), tools and techniques. But the chats also reveal discord in the group, petty quarrels and tangible worries of getting caught by international law enforcement. One key member of Black Basta contended they had been able to elude law enforcement in mid-2024 with help from influential people, a situation that is explored further in this piece.

Read more on Intel471.

Over on LeMagIT, Valéry Rieß-Marchive also covered the implosion of Black Basta, and then took a deeper look at the same key member, known as “Tramp.” LeMagIT’s investigation began intensifying in December 2024, when an anonymous source contacted them, claiming to know Tramp well, and that his real name was allegedly Oleg Y. Nefedov. The source claimed that they had worked with him. The following is a machine translation from LeMagIT:

“He has the best protection [there is] in Russia. He has friends in the security services. He even pays the FSB and the GRU,” the source tells us. These are the Russian intelligence services. “No one has that kind of money or that level of security anymore,” the source adds.

This is indeed what Tramp, also known under the pseudonyms AA and GG, in particular, claims to one of his partners,  dd , on November 14, 2022: “I have guys from Lubyanka [the FSB headquarters in Moscow, editor’s note] and the GRU, I’ve been feeding them for a long time,” we can read in a log of private exchanges that probably took place on the encrypted messaging service Tox. These exchanges were provided to us on December 30, 2024, as well as to our colleagues at  Spiegel.

Read more at LeMagIT and Intel471. Both cover the arrest of Nefedov in Armenia in June 2024, and how he managed to evade detention when a judge scheduled the detention hearing too late under law to detain him. Chats between “usernamegg” and another Black Basta member on July 3 seem to match up with the situation, and Rieß-Marchive tells DataBreaches he is very confident that “Tramp” is Nefodov.

“As we reported, we had intel on that before the leak. And we had other sources, not to be named, confirming it. The leak only helped bringing more pieces together, with the break in GG activity and his mentions of the arrest. With the leak, it all came together.”

Related:  The Hacker Who Escaped Justice (The Standard, translation)

 

 

 

 

 


Related:

  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • Romanian prisoner hacks prison IT system in plot made for a Netflix movie
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
Category: Commentaries and AnalysesMalwareNon-U.S.Of Note

Post navigation

← Data Breach Class Action Dismissed After ‘Alter Ego’ Doctrine Fails
FBCS updates the number affected in its 2024 breach to 4,253,394 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.