Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

UK hydrogen industry poised for expansion, but policy slows momentum

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Black Basta ransomware leader added to EU’s Most Wanted and INTERPOL Red Notices
Identity

Black Basta ransomware leader added to EU’s Most Wanted and INTERPOL Red Notices

userBy userJanuary 17, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 17, 2026Law enforcement/cybercrime

Law enforcement authorities in Ukraine and Germany have identified two Ukrainian nationals suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta.

Additionally, authorities noted that the group’s alleged leader, 35-year-old Russian Oleg Evgenievich Nefedov (Нефедов Олег Евгеньевич), has been added to the European Union’s Most Wanted List and Interpol’s Red Notice List.

“According to the investigation, the suspects specialized in technical hacking of protected systems and were involved in preparing cyber attacks using ransomware,” the Ukrainian Cyber ​​Police said in a statement.

According to the agency, the suspects operated as “hash crackers” who specialized in extracting passwords from information systems using special software. Once the credentials were obtained, members of the ransomware group infiltrated the corporate network, ultimately deploying the ransomware and extorting money to recover the encrypted information.

cyber security

Authorities searched the defendant’s residences in Ivanofrankivsk and Lviv and authorized the seizure of digital storage devices and cryptocurrency assets.

Black Basta first appeared in the threat world in April 2022 and is said to have targeted over 500 businesses across North America, Europe, and Australia. The ransomware group is estimated to have earned hundreds of millions of dollars in crypto through illegal payments.

Early last year, a year’s worth of internal chat logs from Black Basta were leaked online, offering a glimpse into the group’s inner workings, its structure and key members, and the various security vulnerabilities that were exploited to gain initial access to targeted organizations.

The leaked documents also revealed that Nefedov is the ringleader of Black Busta, adding that he uses various aliases, including Trump, Trump, GG, and AA. Some documents claim that Mr. Nefedov has ties to senior Russian politicians and intelligence agencies such as the FSB and GRU.

Nefedov is believed to have used these connections to protect his business and evade international justice. Subsequent Trellix analysis revealed that Nefedov was able to secure his freedom despite being arrested in Yerevan, Armenia in June 2024. His other aliases include Kuruba, Washington, and S. Jimi. Nefedov is said to be in Russia, but his exact whereabouts are unknown.

There is also evidence linking Nefedov to Conti, a now-defunct group that was created in 2020 as Ryuk’s successor. In August 2022, the U.S. Department of State announced a $10 million reward for information about five individuals associated with the Conti ransomware group. They included Target, Trump, Dandis, Professor, and Resyaev.

It is worth mentioning here that after the Conti brand was discontinued in 2022, Black Basta emerged as an autonomous group alongside BlackByte and KaraKurt. Other members joined groups such as BlackCat, Hive, AvosLocker, and HelloKitty, all of which are now defunct.

cyber security

Germany’s Federal Criminal Police Office (BKA, Bundcriminalamt) said: “He served as the head of the group. As such, he decided who or which organization would be the target of the attack, recruited members, assigned tasks, participated in ransom negotiations, and controlled the ransom money obtained through extortion and used it to pay members of the group.”

The breach led to the apparent demise of Black Basta, with the group remaining silent since February and removing the data breach later that month. However, ransomware gangs have been known to go dormant, rebrand, and reemerge under different identities, so it would not be surprising if members of former criminal organizations pivoted to other ransomware groups or formed new ransomware groups.

In fact, several former Black Basta affiliates are suspected to have transitioned into CACTUS ransomware operations, according to reports from ReliaQuest and Trend Micro. This assessment is based on the fact that the Black Basta site went offline in February 2025, which coincided with a massive spike in the number of organizations named on the latter’s data breach site.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article‘Not very attractive’: Pompeii’s bath facilities may have been contaminated with lead-contaminated water
Next Article Trump administration’s legal setbacks are good news for offshore wind and the power grid
user
  • Website

Related Posts

Unmasking new TOAD attacks hidden in legitimate infrastructure

January 28, 2026

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

January 28, 2026

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

UK hydrogen industry poised for expansion, but policy slows momentum

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.