Black Basta
Russian-speaking closed-affiliate ransomware operation widely assessed as a Conti spinoff that began encrypting victims in April 2022, days before the Conti brand wound down following the February 2022 Conti Leaks. Affiliate roster reportedly includes former Conti (Wizard Spider) and REvil members. Heavy targeting of healthcare and U.S. critical-infrastructure sectors; pivoted in mid-2024 to a 'vishing + Microsoft Teams social-engineering' initial-access pattern. Internal chat logs leaked in February 2025 ('BlackBastaGPT' dataset) publicly exposed operations and accelerated the brand's fragmentation.
Aliases
Motivations
Target sectors
Target countries
Lineage & relationships
full graph →Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
- Black Basta
- Unknown
- financial gain
- 170.130.165.73
- moereng.com
- exckicks.com
- healthcare
- manufacturing
- financial
- US
- DE
- +1 more
MITRE ATT&CK techniques
Tools & malware
3 entriesTimeline
1 eventIndicators of compromise
4 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| IPv4 | family · Black Basta Likely Black Basta Cobalt Strike infrastructure first seen October 14, 2024 per Table 7 of the November 8, 2024 update to AA24-131A. | Oct 13, 2024 | CISA |
| Domain | family · Black Basta Suspected Black Basta Cobalt Strike domain first seen October 9, 2024 and listed in Table 8 of the November 8, 2024 update to joint FBI/CISA/HHS/MS-ISAC advisory AA24-131A. Black Basta is a Conti-spinoff RaaS that hit more than 500 organizations across 12 critical-infrastructure sectors, including healthcare. | Oct 8, 2024 | CISA |
| Domain | family · Black Basta Suspected Black Basta Cobalt Strike domain first seen October 2, 2024, listed alongside moereng.com in Table 8 of the November 8, 2024 update to AA24-131A. | Oct 1, 2024 | CISA |
| Name | family · Black Basta Black Basta ransom note filename described in AA24-131A; the note omits a payment amount and directs victims to a .onion site (Basta News). Encrypted files receive a .basta or random extension after ChaCha20+RSA-4096 encryption. | May 9, 2024 | CISA |
Related actors
shared ATT&CK techniques- ?? · UnknownBlackSuit3 shared techniques
- RU · RussiaConti3 shared techniques
- RU · Russia8Base2 shared techniques
- ?? · UnknownAkira2 shared techniques
- ?? · UnknownALPHV/BlackCat2 shared techniques
- RU · RussiaDarkSide2 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). Black Basta — actor profile. Retrieved from https://threatintel.local/actors/black-basta