Trustwave Research Reveals Cybersecurity Risks Threatening Patient Lives in Healthcare. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave Research Reveals Cybersecurity Risks Threatening Patient Lives in Healthcare. Learn More
In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta, a prolific ransomware group.
Trustwave SpiderLabs has taken an in-depth look at the leaked contents, which spell out in detail how the group thinks and operates, revealing discussions on tactics and the effectiveness of various attack tools. Even going so far as to debate the ethical and legal implications of targeting Ascension Health.
You can download the full report here: A Deep Dive into the Leaked Black Basta Chat Logs.
The messages were initially uploaded to MEGA and then reuploaded directly to Telegram on February 11 by the online persona ExploitWhispers. The JSON-based dataset consisted of more than 190,000 messages allegedly exchanged between group members from September 18, 2023, to September 28, 2024.
This data dump offers unparalleled insights into the group's infrastructure, tactics, and inner decision-making processes, drawing inevitable comparisons to the infamous Conti leaks of 2022.
The leak does not expose every detail of the group's inner workings; however, it still provides a unique look into one of the most financially successful ransomware organizations in recent years.
The dataset sheds light on Black Basta's internal workflows, decision-making processes, and team dynamics, offering an unfiltered perspective on how one of the most active ransomware groups operates behind the scenes, drawing parallels to the infamous Conti leaks.
Black Basta has operated since 2022. The group generally maintains a low profile while conducting its operations that target organizations across various sectors, extracting millions in ransom payments. The messages show how members exhibit remarkable autonomy and creativity, adapting quickly to evolving security landscapes.
A significant revelation from the leak is Black Basta's reliance on social engineering tactics. While traditional phishing campaigns remain a staple, in some situations, it uses a more human approach.
For example, there were explicit discussions about targeting individuals based on gender dynamics – female callers were assigned male victims, while male operators handled calls to female targets.
The chat logs further expose Black Basta's strategic approach to vulnerability exploitation. The group actively pursues common and rare vulnerabilities, acquiring zero-day exploits to gain a competitive edge.
Its weaponization strategy demonstrates a calculated effort to maximize the impact of its attacks, often deploying Cobalt Strike for command and control operations. Notably, Black Basta developed a proprietary proxy infrastructure called "Coba PROXY" to handle large volumes of C2 traffic, enhancing both stealth and resilience.
Beyond its technical sophistication, the leak offers a glimpse into Black Basta's negotiation tactics. The group employs aggressive, psychologically manipulative strategies to pressure victims into paying ransoms.
Strategic delays and coercive language are common, with the ultimate goal of extracting the maximum financial gain. Even more concerning is its expansion into previously off-limits targets, including financial institutions within the CIS region.
While the immediate impact of the leak remains uncertain, the exposure of Black Basta's inner workings represents a rare opportunity for cybersecurity professionals to adapt and respond. Understanding its methods enables the development of more effective defensive strategies, bolstering resilience against future ransomware threats.
In the full report, we delve deeper into the technical and operational insights from the leak, exploring how Black Basta's tactics evolve in real time and what this means for the cybersecurity landscape. Stay tuned for a comprehensive analysis that unpacks the revelations and provides actionable intelligence for defenders.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2025 Trustwave Holdings, Inc. All rights reserved.