Fraud Management & Cybercrime,
Ransomware
Former Ransomware Group’s Fallout Reveals Hackers Targeting Microsoft Teams

Recent data leaks from ransomware organizations underscore the evolving tactics used by attackers to compromise and lure in new victims. Notable disclosures include a substantial cache of internal communications from the now-defunct Black Basta, leaked by a reported ex-member named “ExploitWhispers” on February 11. The leaked material included 200,000 chat messages, alongside a SQL database from LockBit released on May 7, which contained crucial victim details and Bitcoin wallet addresses.
Insights from the analysis of these leaks by ReliaQuest suggest organizations should proactively prevent the use of personal Google accounts on corporate devices and educate employees about emerging phishing tactics targeting both email and Microsoft Teams. Monitoring for unauthorized use of scripting languages like Python, frequently used in phishing exploits, is also advised. These insights stem from discussions among Black Basta’s leaders that referenced collaboration with members of the Exploit cybercrime forum, highlighting ongoing relationships within the cybercriminal ecosystem.
The leader of Black Basta, identified as Oleg Nefedov—also known by various aliases—was noted for his extensive background in ransomware activities, having associations with prominent groups like Revil and Conti. The leaked chats reveal an organized structure within Black Basta, with roles such as campaign managers and developers refining their malware, and even social gatherings that resembled legitimate business operations.
As Black Basta appears to have dissolved, the remnants of its operational talent are likely integrating with or supporting newer entities, such as 3AM or the rebranded “Blacklock,” which continues to employ similar phishing strategies. With tactics evolving to exploit Microsoft partner accounts—often utilized for more efficient phishing—these groups seem poised to persist despite challenges from law enforcement actions aimed at disrupting their networks.
Reports indicate a decline in the operational sophistication of newer affiliates within ransomware groups, exemplified by LockBit, which has been scrutinized for recent breaches of established protocols. These developments suggest a shift away from coordinated group efforts to more independent and opportunistic attacks, which may include targeting less conventional territories like China and Russia.
Law enforcement’s increased pressure has created a palpable tension within the cybercrime landscape. Many groups that once thrived on structured operatives are facing disruption, pushing attackers to consider unorthodox methods that were previously avoided. This landscape not only reflects the inherent dangers for these criminal enterprises but also emphasizes the continually evolving threat landscape for businesses.
Ultimately, while the implosion of groups like Black Basta marks a significant development, it also reinforces the reality that the ecosystem of cybercrime is resilient, evolving, and interconnected. Threat actors continue to exploit advanced techniques and maintain relationships that enable them to launch sophisticated campaigns, posing ongoing risks to organizations navigating the complex cybersecurity landscape.