DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Black Basta exposed: A look at a cybercrime data leak and a key member, “Tramp”

Posted on March 2, 2025March 2, 2025 by Dissent

Intel471 reports:

On Feb. 11, 2025, a mysterious leaker going by the Telegram username ExploitWhispers released one year’s worth of internal communications between members of the Black Basta ransomware group on a Telegram channel. Black Basta is still active in a reduced capacity, but in 2022, it was the third most impactful ransomware group. Its members appeared to be experienced Russian-speaking ransomware and cybercrime veterans, some of whom worked with the infamous Contiransomware-as-a-service (RaaS) group. The 197,000 chat messages are drawn from 80 different chatrooms on Matrix servers hosting on six domains. The leak rivals the chat leak that affected Conti ransomware gangin late February 2022. Black Basta’s leak provides similar insight as Conti’s: Black Basta is a polished ransomware group that carefully studied potential victims, ran sophisticated phishing and malware campaigns and employed a range of people for support, including call services, malware development, initial access, crypters and penetration testing. The messages reveal a range of technical data that formed Black Basta’s operations, including cryptocurrency wallets, domain names, indicators of compromise (IoCs), tools and techniques. But the chats also reveal discord in the group, petty quarrels and tangible worries of getting caught by international law enforcement. One key member of Black Basta contended they had been able to elude law enforcement in mid-2024 with help from influential people, a situation that is explored further in this piece.

Read more on Intel471.

Over on LeMagIT, Valéry Rieß-Marchive also covered the implosion of Black Basta, and then took a deeper look at the same key member, known as “Tramp.” LeMagIT’s investigation began intensifying in December 2024, when an anonymous source contacted them, claiming to know Tramp well, and that his real name was allegedly Oleg Y. Nefedov. The source claimed that they had worked with him. The following is a machine translation from LeMagIT:

“He has the best protection [there is] in Russia. He has friends in the security services. He even pays the FSB and the GRU,” the source tells us. These are the Russian intelligence services. “No one has that kind of money or that level of security anymore,” the source adds.

This is indeed what Tramp, also known under the pseudonyms AA and GG, in particular, claims to one of his partners,  dd , on November 14, 2022: “I have guys from Lubyanka [the FSB headquarters in Moscow, editor’s note] and the GRU, I’ve been feeding them for a long time,” we can read in a log of private exchanges that probably took place on the encrypted messaging service Tox. These exchanges were provided to us on December 30, 2024, as well as to our colleagues at  Spiegel.

Read more at LeMagIT and Intel471. Both cover the arrest of Nefedov in Armenia in June 2024, and how he managed to evade detention when a judge scheduled the detention hearing too late under law to detain him. Chats between “usernamegg” and another Black Basta member on July 3 seem to match up with the situation, and Rieß-Marchive tells DataBreaches he is very confident that “Tramp” is Nefodov.

“As we reported, we had intel on that before the leak. And we had other sources, not to be named, confirming it. The leak only helped bringing more pieces together, with the break in GG activity and his mentions of the arrest. With the leak, it all came together.”

Related:  The Hacker Who Escaped Justice (The Standard, translation)

 

 

 

 

 

No related posts.

Category: Commentaries and AnalysesMalwareNon-U.S.Of Note

Post navigation

← Data Breach Class Action Dismissed After ‘Alter Ego’ Doctrine Fails
FBCS updates the number affected in its 2024 breach to 4,253,394 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.