Black Basta ransomware group developed its own automated brute-forcing framework

📟 News

Date: 18/03/2025

According to EclecticIQ, Black Basta Ransomware-as-a-Service (RaaS) group has developed its own automated brute-forcing framework dubbed BRUTED. It’s used to hack edge network devices (e.g. firewalls and VPN).

Analysis of internal Black Basta chat logs that had leaked online in February 2025 revealed the existence of this malicious framework. BRUTED simplifies the initial access to networks for hackers and makes it possible to scale ransomware attacks on vulnerable endpoints. According to experts, Black Basta has been using BRUTED since 2023 to deliver massive credential-stuffing and brute-forcing attacks.

Source code analysis showed that the framework is specially designed to brute-force credentials in the following products: SonicWall NetExtender, Palo Alto GlobalProtect, Cisco AnyConnect, Fortinet SSL VPN, Citrix NetScaler (Citrix Gateway), Microsoft RDWeb (Remote Desktop Web Access), and WatchGuard SSL VPN.

The framework discovers publicly accessible edge network devices that match its target list by enumerating subdomains, resolving IP addresses, and adding prefixes like vpn and remote. Information about matches is transmitted to the remote command-and-control server.

After identifying potential targets, the frameworks gathers password candidates from a remote server, combines them with locally generated guesses, and performs bulk authentication attempts using multiple CPU processes. Special query headers and tailored user-agent strings are used for each target device.

To generate additional password guesses, BRUTED extracts common names (CN) and Subject Alternative Names (SAN) from a target’s SSL certificate getCertDomainsList().

To avoid detection, the framework uses multiples SOCKS5 proxies (all from the domain fuck-you-usa[.]com) while performing high volume of brute-forcing requests. Its three servers are registered under Proton66 (AS 198953) and located in Russia.

Experts believe that tools like BRUTED make ransomware easier to operate; as a result, hackers infiltrate multiple networks with minimal effort, which accelerates monetization.

The key protection strategy against such threats involves strong and unique passwords for all edge devices and VPN accounts, as well as multifactor authentication (MFA) that blocks access even in situations when the credentials were compromised.

Related posts:
2025.02.07 — 768 vulnerabilities were exploited by hackers in 2024

According to VulnCheck, 768 CVEs were registered as exploited in real-life attacks in 2024. This is 20% greater compared to 2023 when hackers exploited 639 vulnerabilities. Interestingly,…

Full article →
2025.03.20 — 8,000 vulnerabilities identified in WordPress ecosystem in 2024

According to Patchstack, world's #1 WordPress vulnerability intelligence provider, 7,966 new vulnerabilities were identified in the WordPress ecosystem in 2024; most of these bugs affected plugins…

Full article →
2025.04.23 — Improper authentication control vulnerability affects ASUS routers with AiCloud

ASUSTeK Computer Inc. fixed an improper authentication control vulnerability in routers with AiCloud. The bug allows remote attackers to perform unauthorized actions on vulnerable devices. The issue…

Full article →
2025.03.16 — Researchers force DeepSeek to write malware

According to Tenable, the AI chatbot DeepSeek R1 from China can be used to write malware (e.g. keyloggers and ransomware). DeepSeek was released in January 2025 and caused a stir…

Full article →
2025.02.03 — PyPI introduces a project archival system to combat malicious updates

The Python Package Index (PyPI) introduces a new project archival system: a project can now be archived to notify users that it's not expected to be updated…

Full article →
2025.04.30 — Coinbase fixes 2FA bug that made customers panic

Cryptocurrency exchange Coinbase has fixed a bug in its Account Activity logs that caused customers to think their credentials were compromised. Earlier this month, BleepingComputer…

Full article →
2025.04.08 — Website of Everest ransomware group hacked and defaced

Last weekend, the darknet website of the Everest ransomware group was hacked and went offline. The attackers replaced its content with a sarcastic message: "Don't do crime…

Full article →
2025.04.15 — Hackers exploit authentication bypass bug in OttoKit WordPress plugin

Hackers exploit an authentication bypass vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin used by more than 100,000 websites. First attacks were recorded just…

Full article →
2025.04.16 — Android devices will restart every three days to protect user data

Google introduces a new security feature for Android devices: locked and unused devices will be automatically restarted after three days of inactivity to return their memory to an…

Full article →
2025.03.05 — Polish Space Agency disconnects its network due to hacker attack

Last weekend, the Polish Space Agency (POLSA) had to disconnect all of its systems from the Internet to localize an attack targeting its IT infrastructure. After discovering the intrusion,…

Full article →