Article Details
Scrape Timestamp (UTC): 2025-06-11 17:47:02.811
Source: https://thehackernews.com/2025/06/former-black-basta-members-use.html
Original Article Text
Click to Toggle View
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks. Former members tied to the Black Basta ransomware operation have been observed sticking to their tried-and-tested approach of email bombing and Microsoft Teams phishing to establish persistent access to target networks. "Recently, attackers have introduced Python script execution alongside these techniques, using cURL requests to fetch and deploy malicious payloads," ReliaQuest said in a report shared with The Hacker News. The development is a sign that the threat actors are continuing to pivot and regroup, despite the Black Basta brand suffering a huge blow and a decline after the public leak of its internal chat logs earlier this February. The cybersecurity company said half of the Teams phishing attacks that were observed between February and May 2025 originated from onmicrosoft[.]com domains, and that breached domains accounted for 42% of the attacks during the same period. The latter is a lot more stealthy and allows threat actors to impersonate legitimate traffic in their attacks. As recently as last month, ReliaQuest's customers in the finance and insurance sector and the construction sector have been targeted using Teams phishing by masquerading as help desk personnel to trick unsuspecting users. "The shutdown of Black Basta's data-leak site, despite the continued use of its tactics, indicates that former affiliates have likely either migrated to another RaaS group or formed a new one," the company added. "The most probable scenario is that former members have joined the CACTUS RaaS group, which is evidenced by Black Basta leader Trump referencing a $500–600K payment to CACTUS in the leaked chats." That said, it's worth noting that CACTUS hasn't named any organizations on its data leak site since March 2025, indicating that the group has either disbanded or is deliberately trying to avoid drawing attention to itself. Another possibility is that the affiliates have moved to BlackLock, which, in turn, is believed to have started collaborating with a ransomware cartel named DragonForce. The threat actors have also been spotted leveraging the access obtained via the Teams phishing technique to initial remote desktop sessions via Quick Assist and AnyDesk, and then downloading a malicious Python script from a remote address and executing it to establish command-and-control (C2) communications. "The use of Python scripts in this attack highlights an evolving tactic that's likely to become more prevalent in future Teams phishing campaigns in the immediate future," ReliaQuest said. The Black Basta-style social engineering strategy of using a combination of email spamming, Teams phishing, and Quick Assist has since also found takers among the BlackSuit ransomware group, raising the possibility that BlackSuit affiliates have either embraced the approach or absorbed members of the group. According to Rapid7, the initial access serves as a pathway to download and execute updated variants of a Java-based RAT that was previously deployed to act as a credential harvester in Black Basta attacks. "The Java malware now abuses cloud-based file hosting services provided by both Google and Microsoft to proxy commands through the respective cloud service provider's (CSP) servers," the company said. "Over time, the malware developer has shifted away from direct proxy connections (i.e., the config option is left blank or not present), towards OneDrive and Google Sheets, and most recently, towards simply using Google Drive." The new iteration of the malware packs in more features to transfer files between the infected host and a remote server, initiate a SOCKS5 proxy tunnel, steal credentials stored in web browsers, present a fake Windows login window, and download a Java class from a supplied URL and run it in memory. Like the 3AM ransomware attacks detailed by Sophos a couple of weeks ago, the intrusions are also characterized by the use of a tunneling backdoor called QDoor, a malware previously attributed to BlackSuit, and a Rust payload that's likely a custom loader for the SSH utility, and a Python RAT referred to as Anubis. The findings come amid a number of developments in the ransomware landscape - "RATs enable attackers to gain remote control over infected systems, allowing them to access files, monitor activities, and manipulate system settings," Quorum Cyber said. "Threat actors can use a RAT to maintain persistence within an organization as well as to introduce additional tooling or malware to the environment. They can also access, manipulate, destroy, or exfiltrate data."
Daily Brief Summary
Former associates of the Black Basta ransomware group have continued employing phishing and Python scripts in their attacks, adopting methods like Microsoft Teams phishing.
ReliaQuest identified significant activity in Teams phishing between February and May 2025, with many attacks originating from compromised onmicrosoft[.]com domains.
These threat actors are impersonating legitimate entities and tend to leverage existing remote desktop tools like Quick Assist and AnyDesk to gain deeper access, followed by deploying malicious Python scripts for command-and-control operations.
After the Black Basta’s internal communications leak in February, the tactics have largely remained the same, although the original group identity has decreased in visibility.
The attackers are speculated to have possibly transitioned to other Ransomware-as-a-Service (RaaS) groups like CACTUS or have integrated into the newly identified BlackLock group and DragonForce ransomware cartel.
New Java-based Remote Access Trojans (RATs) are being deployed by these groups, now utilizing cloud file hosting services to disguise command and control traffic and enhance capabilities like file transfer and data theft.
Rapidly evolving techniques suggest an increase in the complexity and stealth of future phishing campaigns, likely involving more sophisticated RATs and persistent access strategies.