- Регистрация
- 20.12.25
- Сообщения
- 80
- Реакции
- 56
Image: Office of the Ukraine Prosecutor General
Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware group Для просмотра ссылки Войди
Black Basta has been active since at least early 2022 and is believed to be responsible for extorting hundreds of companies, hospitals and public institutions worldwide — including Swiss industrial giant Для просмотра ссылки Войди
The two Black Basta suspects, who were operating from western Ukraine, allegedly specialized in breaching protected systems and preparing ransomware attacks by extracting login credentials from compromised networks. Police Для просмотра ссылки Войди
The stolen credentials were later used to gain unauthorized access to internal corporate systems, escalate privileges within networks, steal sensitive data and deploy ransomware designed to encrypt systems and extort cryptocurrency payments from victims.
Digital storage devices and cryptocurrency assets were seized during searches at the suspects’ homes in Ukraine’s Ivano-Frankivsk and Lviv regions. Ukrainian prosecutors said analysis of the seized material is ongoing.
Alleged ringleader
Germany’s Federal Criminal Police Office (BKA) Для просмотра ссылки ВойдиAs the group’s alleged ringleader, Nefedov is suspected of selecting targets, recruiting members, assigning tasks, negotiating ransom payments and distributing proceeds obtained through extortion. Ransoms were typically demanded in cryptocurrency.
Authorities said he operated under multiple online aliases — including tramp, tr, gg, kurva, AA, Washingt0n, and S.Jimmi — and may also have had ties to another notorious ransomware group, Conti.
German police said Nefedov is believed to be in Russia, although his exact whereabouts are unknown. He has been placed on an international wanted list through Interpol.
Last February, internal chat logs belonging to Black Basta were Для просмотра ссылки Войди
Researchers previously said that several members of the Black Basta crew previously belonged to a criminal network that operated the Conti and Ryuk ransomware strains, as well as the TrickBot banking trojan. More than a dozen individuals linked to those operations have since been publicly identified and sanctioned by Western authorities.
© Для просмотра ссылки Войди