{"id":1187,"date":"2025-04-09T10:57:22","date_gmt":"2025-04-09T10:57:22","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=1187"},"modified":"2025-04-09T10:57:22","modified_gmt":"2025-04-09T10:57:22","slug":"the-woman-needs-to-be-calling-males-leak-exposes-black-bastas-affect-ways","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=1187","title":{"rendered":"\u201cThe woman needs to be calling males.\u201d Leak exposes Black Basta\u2019s affect ways."},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/02\/evil-packet.jpg\" \/><\/p>\n<p>A leak of 190,000 chat messages traded amongst members of the Black Basta ransomware group reveals that it\u2019s a extremely structured and largely environment friendly group staffed by personnel with experience in numerous specialities, together with exploit improvement, infrastructure optimization, social engineering, and extra.<\/p>\n<p>The trove of information was first posted to file-sharing web site MEGA. The messages, which had been despatched from September 2023 to September 2024, had been later posted to Telegram in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2025\/02\/leaked-chat-logs-expose-inner-workings-of-secretive-ransomware-group\/\">February 2025<\/a>. ExploitWhispers, the web persona who took credit score for the leak, additionally offered commentary and context for understanding the communications. The identification of the particular person or individuals behind ExploitWhispers stays unknown. Final month\u2019s leak coincided with the unexplained outage of the Black Basta web site on the darkish net, which has remained down ever since.<\/p>\n<h2>\u201cWe have to exploit as quickly as doable\u201d<\/h2>\n<p>Researchers from safety agency Trustwave\u2019s SpiderLabs pored via the messages, which had been written in Russian, and printed a quick <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/inside-black-basta-uncovering-the-secrets-of-a-ransomware-powerhouse\/\">weblog abstract<\/a> and a extra detailed <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.trustwave.com\/hubfs\/Web\/Library\/Documents_pdf\/A_Deep_Dive_into_the_Leaked_Black_Basta_Chat_Logs.pdf\">evaluate<\/a> of the messages on Tuesday.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2025\/04\/leaked-messages-expose-trade-secrets-of-prolific-black-basta-ransomware-group\/\">Learn full article<\/a><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2025\/04\/leaked-messages-expose-trade-secrets-of-prolific-black-basta-ransomware-group\/#comments\">Feedback<\/a><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>A leak of 190,000 chat messages traded amongst members of the Black Basta ransomware group reveals that it\u2019s a extremely structured and largely environment friendly group staffed by personnel with experience in numerous specialities, together with exploit improvement, infrastructure optimization, social engineering, and extra. The trove of information was first posted to file-sharing web site [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1189,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[1056,449,1052,1055,1051,1057,1054,1053,1058],"class_list":["post-1187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news","tag-bastas","tag-black","tag-calling","tag-exposes","tag-girl","tag-influence","tag-leak","tag-men","tag-tactics"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1187"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1187\/revisions"}],"predecessor-version":[{"id":1188,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1187\/revisions\/1188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/1189"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-15 04:39:58 UTC -->