Ransomware Gang Leak Shows Stolen Passwords And 2FA Codes Driving Attacks

Deepak Gupta
Deepak Gupta

Co-founder/CEO

 
March 3, 2025 3 min read

Stolen passwords and 2FA codes are critical factors in ransomware attacks. Google has warned that cybercrime is becoming a national security threat, evidenced by ongoing chaos from ransomware gangs. The leak of private internal chat logs from the Black Basta crime group has provided insight into their operations. Threat intelligence analysts, such as Alexander Martin from Recorded Future News, note that several members of Black Basta were previously involved in the Conti and Ryuk ransomware schemes. KELA has conducted a comprehensive analysis of the Black Basta leak, indicating that initial access for ransomware attacks often comes from compromised Remote Desktop Protocol (RDP), VPNs, and security portals. Infostealer malware plays a significant role, with stolen credentials being reused for attacks long after they were initially obtained. KELA described the data obtained as a “treasure trove” of usernames, passwords, and authentication data, underscoring the importance of monitoring compromised credentials. For further reading on the implications of these leaks, see KELA's deep-dive into Black Basta and Recorded Future's insights.

Phishing And Brute Force Techniques

Ontinue’s Advanced Threat Operations team analyzed the Black Basta data, revealing that large-scale phishing campaigns targeting Microsoft services like Office 365 were employed to intercept login credentials. Brute-force attacks were also utilized against various VPN and firewall products, including Citrix and SonicWall. Saeed Abbasi from Qualys emphasized that Black Basta operated like a business, forming strategic partnerships and using advanced targeting techniques based on financial data. Understanding the operational strategies of ransomware groups is crucial for defenders. Organizations must implement immediate patching strategies, tighten access controls, and develop rapid incident response protocols to combat these threats effectively. For more on this topic, check out Qualys' warning and Ontinue's analysis.

The Infostealer Malware Threat

Infostealer malware has compromised 3.9 billion passwords, with over 4.3 million machines infected in 2024. According to KELA’s state of cybercrime report, the predominant strains responsible for these infections include Lumma, StealC, and Redline. This malware enables attackers to compromise large volumes of accounts, significantly increasing the scale of malicious activities. Organizations must adopt multi-factor authentication across all accounts and implement advanced email filtering solutions to mitigate these threats. KELA's report emphasizes that nearly 65% of compromised credentials come from personal computers with corporate credentials saved, highlighting the need for better cybersecurity hygiene. For a deeper understanding of this issue, consider KELA's state of cybercrime report and Hudson Rock's analysis of infostealer infections.

The Role of AI in Cyber Threats

The rise of AI poses a significant threat to password security. AI can crack even strong passwords in a short amount of time. Ignas Valancius of NordPass warns that as AI tools become more prevalent, the time required to guess or brute-force passwords will decrease dramatically, especially for shorter passwords. To improve password hygiene, Valancius recommends creating long, random passphrases, using different passwords for different accounts, and considering passkeys that offer a safer alternative to traditional passwords. For more on securing passwords against AI threats, refer to the article on AI-powered hacks targeting Gmail. GrackerAI offers solutions for organizations seeking to enhance their cybersecurity marketing strategies. Our platform helps transform security news into strategic content opportunities, enabling teams to identify emerging trends and monitor threats effectively. Explore our services at GrackerAI to strengthen your cybersecurity posture and engage with the latest developments in the threat landscape.

Latest Cybersecurity Trends & Breaking News

Deepak Gupta
Deepak Gupta

Co-founder/CEO

 

Cybersecurity veteran and serial entrepreneur who built GrackerAI to solve the link between B2B SaaS product and search engine. Leads the mission to help cybersecurity brands dominate search results through AI-powered product-led ecosystem.

Related Articles

How Social Media Aggregators Drive B2B Engagement and SEO Results
social media aggregators

How Social Media Aggregators Drive B2B Engagement and SEO Results

Learn how social media aggregators drive B2B engagement, boost SEO rankings, build trust with social proof, and enhance brand visibility.

By Ankit Agarwal December 4, 2025 3 min read
Read full article
Leveraging Generative AI for Growth Hacking: Insights for Startups
generative AI

Leveraging Generative AI for Growth Hacking: Insights for Startups

Discover how startups are leveraging generative AI for growth hacking. Learn practical strategies for content, marketing, automation, and ethical AI implementation.

By Vijay Shekhawat December 4, 2025 10 min read
Read full article
Why Fast, Secure Hosting Matters for AI-Generated Programmatic SEO Pages in Cybersecurity
fast hosting

Why Fast, Secure Hosting Matters for AI-Generated Programmatic SEO Pages in Cybersecurity

Learn why fast, secure hosting is crucial for AI-generated programmatic SEO pages in cybersecurity, improving speed, uptime, security, and search rankings.

By Pratham Panchariya December 4, 2025 4 min read
Read full article
Technical SEO vs. Content SEO: HOW Each Works Differently

Technical SEO vs. Content SEO: HOW Each Works Differently

Learn the essential differences between technical & content SEO. Compare features, benefits & best practices. Includes real examples & implementation tips

By Pratham Panchariya December 4, 2025 8 min read
Read full article