Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

AI Internet is down: Google Cloud outage breaks Firebase, Supabase, Cursor, Lovable, etc.

TwinH: Where Music Meets the Future of Creativity

Digital banking startup Chime pops with IPO debut, raising $700 million at a valuation of $11.6 billion

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Former Black Busta members use Microsoft team and Python scripts in the 2025 attack
Identity

Former Black Busta members use Microsoft team and Python scripts in the 2025 attack

userBy userJune 11, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 11, 2025Ravi LakshmananRansomware/Cybercrime

Former Black Busta member

It has been observed that former members associated with Blackbustaroransomware operations are stuck with the trial and error approach of email bombing and Microsoft teams in phishing to establish persistent access to the target network.

“Recently, attackers introduced Python script execution along with these techniques and deployed malicious payloads using Curl requests,” ReliaQuest said in a report shared with Hacker News.

The development is a sign that threat actors continue to pivot and reorganize despite the Black Busta brand suffering a major blow and decline following the leak of internal chat logs this early February.

The cybersecurity company said half of the team’s phishing attacks observed between February and May 2025 came from Onmicrosoft.[.]The COM domain, and its compromised domain, accounted for 42% of attacks during the same period. The latter is much more stealthy, allowing threat actors to impersonate legal traffic in attacks.

Just like last month, ReliaQuest’s financial and insurance sector and construction customers are being targeted using team phishing that tricks unsuspecting users into pretending to be help desk personnel.

“The closure of Black Basta’s data leak site indicates that despite the continued use of its tactics, it is likely that the previous affiliates have moved to another Raas group or formed a new group,” the company added. “The most likely scenario is that a former member has joined the Cactus Raas group, evidenced by Trump, the leader of Black Busta, who refers to a $500-600,000 payment to Cactus in leaked chats.”

Cybersecurity

That said, it is worth noting that since March 2025, cacti have not named organizations in data leak sites. This indicates that the group has either broken up or intentionally attempts to avoid attracting attention to themselves. Another possibility is that affiliates have moved to BlackRock. This is believed to have begun working with a ransomware cartel named Dragonforce.

Threat actors also leverage access obtained through team phishing techniques to leverage access to the first remote desktop session via Quick Assist and anyDesk, download malicious Python scripts from the remote address and run to establish command and control (C2) communication.

“The use of Python scripts in this attack highlights evolving tactics that are likely to become more common in future team phishing campaigns in the near future,” ReliaQuest said.

Black Busta Style’s social engineering strategy, which uses a combination of email spam, team phishing and quick assist, finds takers within the Black Suit ransomware group, increasing the likelihood that Black Suit affiliates have either embraced the group’s approach or absorbed group members.

According to Rapid7, initial access serves as a pathway to download and run the updated variants of Java-based rats that were previously deployed to serve as a qualified harvester for Black Basta Attacks.

“Java Malware abuses the cloud-based file hosting services that both Google and Microsoft provide to proxy commands through their respective cloud service provider (CSP) servers,” the company says. “As time passed, malware developers have recently moved to using Google Drive, heading towards direct proxy connections (i.e., configuration options left blank or not present), OneDrive and Google Sheets.”

A new iteration of malware transfers files between the infected host and the remote server, starts a Socks5 proxy tunnel, steals credentials stored in a web browser, presents a fake Windows login window, downloads Java classes from the included URL and runs them in memory.

Like the 3am ransomware attack detailed by Sophos a few weeks ago, the intrusion is also characterized by the use of tunneling backdoors called Qdoor, a malware previously attributed to black suits, and the use of a custom loader of SSH utility and a rusty payload of python rats called Anubis.

Cybersecurity

Findings arise among many developments in ransomware landscapes –

The financially motivated group known as scattered spiders targets managed service providers (MSPs) and IT vendors as part of a “one-to-manager” approach that permeates multiple organizations through a single compromise. Scattered Spider bypassed Multi-Factor Authentication (MFA) using the Evilginx Phishing kit and used forging strategic alliances with leading ransomware operators such as Alphv (aka Blackcat), Ransomhub), and Dragonforce to create fake login pages. Qilin (aka Agenda and Phantom Mantis) ransomware operators launched a coordinated intrusion campaign targeting several organizations between May and June 2025 by weaponizing Fortinet Fortigate vulnerabilities (such as CVE-2024-21762 and CVE-2024-55591) for initial access. The play (aka BalloonFly and PlayCrypt) ransomware group is estimated to have compromised 900 entities in May 2025 in the mid-May 2025. Some attacks have leveraged SimpleHelp’s flaws (CVE-2024-57727) to target many US-based entities after the vulnerability is revealed. The administrator of the Vanhelsing Ransomware Group leaked the entire source code for the Ramp Forum, citing an internal dispute between developers and leadership. Leaked details include blogs with TOR keys, ransomware source code, administrator web panels, chat systems, file servers, and a complete database per product. The Interlock Ransomware Group deployed a previously undocumented JavaScript Remote Access Trojan as part of an attack targeting UK local governments and higher education organizations in January and March 2025.

“The rat allows attackers to remotely control infected systems, access files, monitor activity and manipulate system settings,” said Quorum Cyber. “Threat actors can use mice to maintain persistence within their organization, deploy additional tools and malware in their environments, and also access, manipulate, destroy, or remove data.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhole Foods warns of shortages following cyberattacks on its major distributor UNFI
Next Article Snapchat unfolds a new $8.99 lens + subscription layer
user
  • Website

Related Posts

How Vextrio and Affiliates run a global fraud network

June 12, 2025

New token break attacks bypass AI moderation with text changes for single characters

June 12, 2025

AI agents run on secret accounts – learn how to protect them in this webinar

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AI Internet is down: Google Cloud outage breaks Firebase, Supabase, Cursor, Lovable, etc.

TwinH: Where Music Meets the Future of Creativity

Digital banking startup Chime pops with IPO debut, raising $700 million at a valuation of $11.6 billion

How Vextrio and Affiliates run a global fraud network

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AI Internet is down: Google Cloud outage breaks Firebase, Supabase, Cursor, Lovable, etc.

Digital banking startup Chime pops with IPO debut, raising $700 million at a valuation of $11.6 billion

Spanish AI Startup Multiverse raises $227 million to reduce LLMS and reduce inference costs by 80%

Gecko Robotics joins Unicorn Club to get a $125 million salary increase and make infrastructure safer with AI-powered wall climbing robots

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.