Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice

Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice

Posted on January 17, 2026January 17, 2026 By CWS

Ravie LakshmananJan 17, 2026Law Enforcement / Cybercrime
Ukrainian and German regulation enforcement authorities have recognized two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta.
As well as, the group’s alleged chief, a 35-year-old Russian nationwide named Oleg Evgenievich Nefedov (Нефедов Олег Евгеньевич), has been added to the European Union’s Most Needed and INTERPOL’s Pink Discover lists, authorities famous.
“In keeping with the investigation, the suspects specialised in technical hacking of protected techniques and had been concerned in making ready cyberattacks utilizing ransomware,” the Cyber Police of Ukraine mentioned in an announcement.
The company mentioned the accused people functioned as “hash crackers,” who concentrate on extracting passwords from info techniques utilizing specialised software program. As soon as the credential info was obtained, members of the ransomware group broke into company networks and in the end deployed ransomware and extorted cash to get well the encrypted info.

Authorities carried out searches on the defendants’ residences situated in Ivano-Frankivsk and Lviv, permitting them to grab digital storage units and cryptocurrency property.
Black Basta first emerged within the risk panorama in April 2022, and is claimed to have focused greater than 500 corporations throughout North America, Europe, and Australia. The ransomware group is estimated to have earned a whole bunch of thousands and thousands of {dollars} in cryptocurrency from illicit funds.

Early final yr, a yr’s value of inside chat logs from Black Basta leaked on-line, providing a glimpse into the group’s interior workings, its construction and key members, and the varied safety vulnerabilities exploited to realize preliminary entry to organizations of curiosity.
The leaked file additionally unmasked Nefedov as Black Basta’s ringleader, including he goes by numerous aliases, corresponding to Tramp, Trump, GG, and AA. Some paperwork alleged that Nefedov had ties to high-ranking Russian politicians and intelligence companies, together with the FSB and GRU.
Nefedov is believed to have leveraged these connections to guard his operations and evade worldwide justice. A subsequent evaluation from Trellix revealed that Nefedov was capable of safe his freedom regardless of getting arrested in Yerevan, Armenia, in June 2024. His different aliases embrace kurva, Washingt0n, and S.Jimmi. Though Nefedov is claimed to be in Russia, his precise whereabouts are unknown.

Moreover, there may be proof linking Nefedov to Conti, a now-defunct group that sprang forth in 2020 as a successor to Ryuk. In August 2022, the U.S. State Division introduced a $10 million reward for info associated to 5 people related to the Conti ransomware group. They included Goal, Tramp, Dandis, Professor, and Reshaev.
It is value mentioning right here that Black Basta surfaced as an autonomous group, alongside BlackByte and KaraKurt, following the retirement of the Conti model in 2022. Different members joined teams like BlackCat, Hive, AvosLocker, and HelloKitty, all of which at the moment are now not lively.

“He served as the top of the group. As such, he determined who or which organisations could be the targets of assaults, recruited members, assigned them duties, took half in ransom negotiations, managed the ransom obtained by extortion, and used it to pay the members of the group,” Germany’s Federal Legal Police Workplace (BKA or Bundeskriminalamt) mentioned.
The leaks have led to Black Basta’s obvious demise, with the group remaining silent after February and taking down its knowledge leak later that month. However with ransomware gangs recognized to close down, rebrand, and reemerge underneath a unique identification, it will not be shocking if members of the erstwhile prison syndicate pivot to different ransomware teams or type new ones.
Certainly, per studies from ReliaQuest and Pattern Micro, it is suspected that a number of of the previous Black Basta associates might need migrated to the CACTUS ransomware operation – an evaluation primarily based on the truth that there was a large spike in organizations named on the latter’s knowledge leak website in February 2025, coinciding with Black Basta’s website going offline.

The Hacker News Tags:Added, Basta, Black, INTERPOL, Leader, Notice, Ransomware, Red, Wanted

Post navigation

Previous Post: Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
Next Post: Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking

Related Posts

PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack The Hacker News
Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files The Hacker News
⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More ⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More The Hacker News
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts The Hacker News
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker News
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News