Defense Lessons From the Black Basta Ransomware Playbook

Saeed Abbasi

The cybersecurity world was rocked last week by a massive leak of Black Basta’s internal communications that emerged from the group’s chat logs. Triggered by internal conflicts and a retaliatory data dump following attacks on Russian banks, the exposed records offer a rare glimpse into Black Basta’s tactics, operations, and leadership.

We’ve analyzed these newly unveiled tactics, and in this blog, we equip security teams with clear, actionable insights. We aim to highlight the key lessons learned—like immediate patching, tighter access controls, and rapid incident response—and provide an urgent call to action. This practical guide aims to help organizations strengthen their defenses against evolving ransomware threats and mitigate potential damage.

Know Your Enemy’s Playbook

Understanding Black Basta’s attack tactics is critical for enterprises seeking to fortify their defenses. The Black Basta ransomware group leverages known vulnerabilities, misconfigurations, and insufficient security controls to breach systems. Their internal discussions reveal active targeting of exposed RDP servers, weak authentication mechanisms, and the deployment of malware droppers disguised as legitimate files​​.

Key attack vectors used by Black Basta include scanning for exposed RDP and VPN services—often relying on default VPN credentials or brute-forcing stolen credentials to gain initial access—and exploiting publicly known CVEs when systems remain unpatched. MSI and VBS-based malware droppers are frequently utilized to deliver malicious payloads, with Rundll32.exe leveraged to execute harmful DLLs. Credential harvesting and privilege escalation are also central to these tactics.

Patch Now: Top 20 CVEs Actively Exploited by Black Basta Ransomware Gangs

Black Basta Ransomware gangs are relentless, and leaked conversations reveal their playbook: a hit list of weaponized vulnerabilities they exploit against enterprise networks. For IT security professionals and practitioners, this isn’t just a list—it’s a call to action.

Below is a practical table featuring the Top 20 CVEs that demand immediate attention. These are the flaws ransomware crews are buzzing about, and your organization could be next if these aren’t patched yesterday. Qualys is proud to have coverage for all 62 CVEs mentioned in the leaked documents, the full list of CVEs mentioned can be found in Appendix A.

#NameCVEProductQVSQID
1FollinaCVE-2022-30190Microsoft Office10091909
2Log4ShellCVE-2021-44228Apache Log4j (Java apps)100376157, 730297, 178935, etc
3Spring4ShellCVE-2022-22965Spring Framework (Java)100376506, 984158, 376514, etc
4F5 BIG-IPCVE-2022-1388F5 BIG-IP load balancers100376577, 730489
5Chrome Zero-DayCVE-2022-0609Google Chrome95376416, 690793, 179083, etc
6OfficeCVE-2017-11882Microsoft Office 100110308
7ProxyNotShellCVE-2022-41082/41040Microsoft Exchange Server9550122, 730621
8ZimbraCVE-2022-27925/41352Zimbra Collaboration Suite100376769, 378336
9Atlassian Confluence RCECVE-2022-26134Confluence Server100730514, 376657
10Zyxel RCECVE-2022-30525Zyxel Firewalls96730491
11FortiGate SSL VPN RCECVE-2024-21762Fortinet SSL VPN9544170
12GlobalProtect RCECVE-2024-3400Palo Alto Networks PAN-OS100731378, 731456, 731460
13Outlook*CVE-2023-23397Microsoft Outlook92110428
14Windows Sandbox Escape*CVE-2023-28252Microsoft Windows 9592005, 92003
15Juniper SRX Firewall RCE*CVE-2023-36844-47Juniper SRX firewalls9544099
16Linux LPECVE-2024-1086Linux kernels95755747, 755751, 755750
17ScreenConnect RCECVE-2024-1709ConnectWise ScreenConnect100379390
18Ivanti SSL-VPN Pre-Auth RCE*CVE-2024-21887/21893Ivanti Connect Secure100731074
19FortiSIEM RCECVE-2024-23108/23109Fortinet FortiSIEM72379902
20Windows LPECVE-2024-26169Microsoft Windows9592121

Note: CVEs marked with an asterisk (*) are not explicitly mentioned; however, based on their characteristics and the details discussed in the leaked data, they have been mapped to the corresponding CVEs.

Security teams must immediately patch the above-mentioned vulnerabilities that are actively exploited in ransomware campaigns.


Talk to Qualys Experts to see how you can implement this guidance today.


Most Wanted: Critical Misconfigurations to Fix Immediately

The table below highlights the top misconfigurations routinely exploited by Black Basta ransomware operators—real-world vulnerabilities integral to their attack workflow. Because attackers are actively scanning your perimeter for these weaknesses, treat them as “Patch Now” issues to stay one step ahead of ransomware threats.

#MisconfigurationProduct
1SMBv1 Enabled on Legacy SystemsWindows Servers
2Default CredentialsServers,  Routers,  VPNs,  IoT
3Weak VPN ConfigurationsCisco, Fortinet,  GlobalProtect
4Exposed RDP Without FilteringWindows Servers
5Public S3 BucketsAWS S3 Storage
6Open Jenkins ServersCI/CD Pipelines
7Unpatched Cisco ASA FirewallsCisco ASA Devices
8Weak MSSQL AuthenticationMicrosoft SQL Servers
9Citrix Netscaler MisconfigsCitrix ADC/NetScaler
10Shadow IT/SubdomainsOrphaned DNS Records

The Initial Access Problem

Black Basta employs a layered approach involving credential theft, service exploitation (such as RDP brute force), social engineering, and persistence. They obtain credentials through phishing, supply chain compromises, dark web purchases, and by locating exposed services using tools like Shodan or Fofa (automated scanners), followed by brute-force attacks on accessible login portals (e.g., RDP). Internal communications confirm multiple tactics for establishing an initial foothold. This layered approach includes:

  • Exploitation of Exposed Services & Misconfigurations: They aggressively search for internet-facing vulnerabilities, particularly in Jenkins CI/CD instances, VMware ESXi hosts, Citrix gateways, and VPNs with weak credentials.
  • Abuse of Third-Party Services for Payload Hosting: To evade detection, they rely on legitimate file-sharing platforms like transfer.sh, temp.sh, and send.vis.ee for hosting malicious payloads, reducing the need for custom infrastructure.
  • Data Exfiltration, Social Engineering, and Voice Phishing: Before deploying ransomware, they archive and extract entire file directories. Internal chats mention targeting legal and financial documents and using custom-built tool to automate data extraction. Beyond email phishing, Black Basta members impersonate IT support staff via phone calls, tricking employees into revealing credentials.

Attackers Move Fast

Ransomware groups are no longer taking their time once they breach an organization’s network. Recently leaked data from Black Basta shows they’re moving from initial access to network-wide compromise within hours—sometimes even minutes.

Ransomware operators are accelerating their attacks, leaving organizations with little time to respond. To prevent widespread damage, it’s critical to proactively detect known exploited vulnerabilities and minimize the attack surface. The longer you wait, the more likely attackers will exfiltrate data and lock down your environment. In many cases, automated scripts run post-exploitation tasks such as dumping credentials, disabling security tools, and deploying ransomware.

How Qualys Can Help

The recent leak of the Black Basta ransomware group’s internal chat logs has provided unprecedented insights into its operations, tools, and tactics. Qualys’ product suite aligns perfectly with the critical recommendations we’ve highlighted, offering a unified approach to cybersecurity.

The CyberSecurity Asset Management (CSAM) solution provides complete visibility of assets, which is in line with the comprehensive asset discovery needed. Qualys Patch Management delivers an advanced automated solution for timely software updates. Meanwhile, Qualys VMDR streamlines discovering, assessing, and prioritizing vulnerabilities. With its TruRisk scoring, the platform takes vulnerability management to the next level by incorporating risk-based prioritization, leading to more effective cybersecurity measures.

Our solutions are equipped to detect and mitigate the tactics, techniques, and procedures (TTPs) employed by Black Basta. This includes indicators of compromise (IOCs) and indicators of attack (IOAs) derived from the leaked logs, such as IP addresses, domains, and malware hashes used by the group. Our dedicated threat research team actively analyzes emerging data, including the leaked Black Basta logs. This allows us to identify novel IOCs and adapt our detection mechanisms in real time. For instance, details from the logs about vulnerabilities exploited in Citrix, Ivanti, and Fortinet products have been integrated into our detection capabilities. Using our proprietary AI models, we continuously scan for credible and trending threat intelligence across the web. These models automatically craft detection logic for emerging threats like Black Basta’s operations.


Talk to Qualys Experts to see how you can implement this guidance today.


VMDR QQL for Black Basta

Qualys Query Language (QQL) is a powerful search tool within VMDR (Vulnerability Management, Detection, and Response) that helps security teams quickly identify and prioritize vulnerabilities. With QQL for Black Basta, you can instantly query your environment to detect assets exposed to ransomware-targeted CVEs, misconfigurations, and security gaps. This enables faster remediation and risk-based prioritization, helping organizations stay ahead of evolving threats like Black Basta.

vulnerabilities.vulnerability.threatIntel.malwareName:"Black Basta"

Appendix A:

CVE-2017-11882, CVE-2021-26855, CVE-2021-28482, CVE-2021-40444, CVE-2021-42278, CVE-2021-42287, CVE-2021-42321, CVE-2021-44228, CVE-2022-0609, CVE-2022-1388, CVE-2022-22965, CVE-2022-26134, CVE-2022-27925, CVE-2022-30190, CVE-2022-30525, CVE-2022-37042, CVE-2022-37969, CVE-2022-41040, CVE-2022-41082, CVE-2022-41352, CVE-2023-20198, CVE-2023-21716, CVE-2023-22515, CVE-2023-29357, CVE-2023-35628, CVE-2023-36394, CVE-2023-36745, CVE-2023-36845, CVE-2023-36874, CVE-2023-36884, CVE-2023-38831, CVE-2023-42115, CVE-2023-42793, CVE-2023-4966, CVE-2023-6875, CVE-2023-7027, CVE-2023-7028, CVE-2024-1086, CVE-2024-1709, CVE-2024-21338, CVE-2024-21378, CVE-2024-21413, CVE-2024-21683, CVE-2024-21762, CVE-2024-23108, CVE-2024-23109, CVE-2024-23113, CVE-2024-23897, CVE-2024-24919, CVE-2024-25600, CVE-2024-26169, CVE-2024-27198, CVE-2024-3400, CVE-2017-5753, CVE-2017-5754, CVE-2020-1472, CVE-2023-23397, CVE-2023-3466, CVE-2023-3467, CVE-2023-3519, CVE-2023-36844, CVE-2024-1708

Share your Comments

Comments

Your email address will not be published. Required fields are marked *