Black Basta Ransomware Leader Added to Interpol Red Notice

Related

Lotus Blossom Hackers Compromised Notepad++ Hosting Infrastructure to Deliver Malware

What happened The state-sponsored threat group Lotus Blossom breached the...

Lithuania Launches National Initiative to Counter AI-Driven Cyber Fraud

What happened Lithuania has launched a government-funded national initiative aimed...

ClickFix Attack Abuses nslookup to Deliver PowerShell Malware via DNS

What happened Threat actors have introduced a new ClickFix attack...

Snail Mail Phishing Campaign Targets Trezor and Ledger Crypto Wallet Users

What happened Threat actors have launched a phishing campaign using...

Share

What happened

The Black Basta ransomware leader was added to Interpol’s Red Notice following investigations by international law enforcement. Trellix researchers analyzed leaked internal chat logs from Black Basta, identifying Oleg Evgenievich Nefedov as the gang leader. Authorities in Ukraine and Germany confirmed Nefedov’s role and added him to Europol and Interpol wanted lists. The gang operates as ransomware-as-a-service (RaaS) and has conducted at least 600 ransomware attacks globally, including data theft and extortion against organizations such as Rheinmetall, Hyundai Europe, BT Group, Ascension, ABB, American Dental Association, Capita, Toronto Public Library, and Yellow Pages Canada. Investigations revealed that affiliates specialize in breaching protected systems, escalating privileges, and preparing networks for ransomware deployment, with digital devices and cryptocurrency seized during law enforcement raids.

Who is affected

Organizations previously targeted by Black Basta face direct exposure to data theft and ransomware, while other enterprises remain indirectly at risk from ongoing affiliate operations using the same TTPs.

Why CISOs should care

Leadership disruption in ransomware groups does not stop affiliate activity. Enterprises remain at risk of encryption, data exfiltration, and operational disruption from distributed RaaS operations.

3 practical actions

  • Enhance ransomware resilience: Maintain offline backups, test recovery procedures, and validate incident response plans.
  • Monitor for Black Basta tactics: Detect lateral movement, credential abuse, and ransomware preparation activity.
  • Review legal and response readiness: Ensure incident response processes include communication, containment, and regulatory reporting for extortion incidents.