Black Basta Ransomware Leader Added to Interpol Red Notice

Related

In Praise of CISA

Lately, the Cybersecurity and Infrastructure Security Agency (CISA) has...

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

The Black Basta ransomware leader was added to Interpol’s Red Notice following investigations by international law enforcement. Trellix researchers analyzed leaked internal chat logs from Black Basta, identifying Oleg Evgenievich Nefedov as the gang leader. Authorities in Ukraine and Germany confirmed Nefedov’s role and added him to Europol and Interpol wanted lists. The gang operates as ransomware-as-a-service (RaaS) and has conducted at least 600 ransomware attacks globally, including data theft and extortion against organizations such as Rheinmetall, Hyundai Europe, BT Group, Ascension, ABB, American Dental Association, Capita, Toronto Public Library, and Yellow Pages Canada. Investigations revealed that affiliates specialize in breaching protected systems, escalating privileges, and preparing networks for ransomware deployment, with digital devices and cryptocurrency seized during law enforcement raids.

Who is affected

Organizations previously targeted by Black Basta face direct exposure to data theft and ransomware, while other enterprises remain indirectly at risk from ongoing affiliate operations using the same TTPs.

Why CISOs should care

Leadership disruption in ransomware groups does not stop affiliate activity. Enterprises remain at risk of encryption, data exfiltration, and operational disruption from distributed RaaS operations.

3 practical actions

  • Enhance ransomware resilience: Maintain offline backups, test recovery procedures, and validate incident response plans.
  • Monitor for Black Basta tactics: Detect lateral movement, credential abuse, and ransomware preparation activity.
  • Review legal and response readiness: Ensure incident response processes include communication, containment, and regulatory reporting for extortion incidents.