Black Basta boss makes it onto Interpol's 'Red Notice' list
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求是直接写文章描述,不需要开头。首先,我得仔细阅读文章内容,找出关键信息。 文章主要讲的是乌克兰和德国执法机构确认了Black Basta勒索软件团伙的头目身份,并将其加入欧警局和国际刑警组织的通缉名单。头目是35岁的俄罗斯人Oleg Evgenievich Nefedov。此外,乌克兰警方还识别了另外两名嫌疑人,并进行了突击搜查,查获了数字存储设备和加密货币资产。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖主要人物、执法机构、嫌疑人数量以及行动结果。同时,要保持语言简洁明了。 可能的结构是:执法机构确认头目身份,加入通缉名单,并提到另外两名嫌疑人被识别和突击搜查的结果。这样就能在有限的字数内传达所有关键信息。 现在,我来组织语言:乌克兰和德国执法机构确认Black Basta勒索软件团伙头目为俄罗斯籍Oleg Evgenievich Nefedov,并将其加入欧警局和国际刑警组织的通缉名单。另外两名嫌疑人被识别并突击搜查,查获了数字存储设备和加密货币资产。 检查一下字数是否在100字以内,并确保没有遗漏重要信息。看起来没问题,可以这样总结。 </think> 乌克兰和德国执法机构确认Black Basta勒索软件团伙头目为俄罗斯籍Oleg Evgenievich Nefedov,并将其加入欧警局和国际刑警组织的通缉名单。另外两名嫌疑人被识别并突击搜查,查获了数字存储设备和加密货币资产。 2026-1-16 19:15:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Interpol

The identity of the Black Basta ransomware gang leader has been confirmed by law enforcement in Ukraine and Germany, and the individual has been added to the wanted list of Europol and Interpol.

Germany's Federal Criminal Police Office (BKA) identified Oleg Evgenievich Nefedov, a 35-year-old Russian national, as the leader of the Black Basta ransomware gang.

The Ukrainian police in collaboration with German authorities also identified two additional individuals allegedly working for the ransomware operation and conducted raids at two locations in the Ivano-Frankivsk and Lviv regions.

Wiz

The police say that the two suspects specialized in gaining initial access to target networks and prepared the ground for the subsequent phases of the ransomware attack.

"According to investigators, the suspects specialized in technically breaching protected systems and were involved in preparing ransomware-based cyberattacks," Ukraine's cyberpolice said.

"The attackers performed the functions of so-called hash crackers - individuals who specialize in extracting passwords to accounts from information systems using specialized software," the press release explains.

After getting access credentials belonging to company employees, the suspects breached internal corporate systems and increased the privileges of the stolen accounts.

During the raids at the locations of the two suspected members of the Russian-affiliated hacker group, the Ukrainian police seized digital storage devices and cryptocurrency assets.

From the police raid
From the police raid at a suspect's house
Source: cyberpolice.gov.ua

The Black Basta boss

Nefedov, known online under the aliases: tramp, tr, gg, kurva, AA, Washingt0n, and S.Jimmi, has been linked to the cybercriminal operation since last February, after someone leaked more than 200,000 chat messages between Black Basta members.

While Nefedov is believed to be the founder and leader of Black Basta, there is also credible evidence linking him to Conti, a now-defunct ransomware syndicate that emerged in 2020 as a successor to Ryuk.

After Conti shut down, it split into smaller cells that infiltrated other ransomware operations or took over existing ones. One of the new operations was Black Basta, considered a rebranding of the old Conti.

Security researchers at Trellix analyzed the leaked texts and found conversations between GG and Chuck about "a $10 million reward for information on ‘tr’ (possibly ‘-amp’), potentially referring to the US bounty for five key members of the Conti gang, including the hacker Tramp."

"In the leaked chat, GG was indeed identified as Tramp (Conti leader) by ‘bio’, (also known as ‘pumba’, another Conti member)," Trellix researchers said.

It should be mentioned that in February 2022, after Russia invaded Ukraine, a researcher leaked internal chats from the Conti operation, where Tramp was referenced as the leader.

However, authorities have officially confirmed Nefedov as the leader of the Black Basta ransomware gang and have added him to Europol's "Most Wanted" and Interpol's "Red Notice" lists.

The Black Basta ransomware-as-a-service (RaaS) operation emerged in April 2022 and is believed to be responsible for at least 600 ransomware incidents, data theft, and extortion targeting large organizations worldwide.

Notable victims include German defense contractor Rheinmetall, Hyundai's European division, BT Group (formerly British Telecom), U.S. healthcare giant Ascension, government contractor ABB, the American Dental Association, U.K. tech outsourcing firm Capita, the Toronto Public Library, and Yellow Pages Canada.

BleepingComputer has contacted the Ukrainian police asking for more information about the operation, but a comment wasn't immediately available.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/black-basta-boss-makes-it-onto-interpols-red-notice-list/
如有侵权请联系:admin#unsafe.sh