Black Basta: Profiling Threat Actors in the German Landscape

Image cover for blog post.

Mar 5, 2025

Profile image of Abhilash Hota

Abhilash Hota

A recently leaked chat log from the threat actor Black Basta offers a rare glimpse into the shadowy world of cybercrime in Germany. Our analysis reveals how threat actors discuss security vulnerabilities in their internal chats— which weaknesses they target most, what attack vectors they use, and which products are in their crosshairs. We examined 51 vulnerabilities mentioned in these conversations in connection with German domains. The findings paint an alarming picture of the current threat landscape and highlight the urgency for proper prioritization of vulnerabilities for remediation.

Victim German Domains

This wordcloud showcases German domains targeted by the threat actor black basta.

Domain Wordcloud

Exploited Vulnerability Severity Distribution

Vulnerabilities with “Critical” severity account for less than 50% of the exploited ones, highlighting the limitations of a purely CVSS-centric approach to vulnerability prioritization.

CVSS Severity Distribution

Exploited Vulnerability Age

Analysis by year indicated a focus on newer vulnerabilities, with most vulnerabilities (CVEs) published between 2022 and 2024.

CVE Temporal Distribution

Common Weakness Distribution

The top weaknesses, as identified by CWE IDs, pointed to common risk areas. Path traversal, improper input validation, and memory safety vulnerabilities are the top 3 in these chat logs.

Top 10 CWEs

Availability of Exploit Code

A PoC (Proof-of-Concept) source analysis revealed the easy availability of public and commercial exploit code for the vulnerabilities. It overlaps among scanning tools and PoC sources.

Public Tooling

Exploited Vendors and Products

Certain vendors and products consistently dominated the conversation. This insight may help stakeholders prioritize which entities to scrutinize for potential vulnerabilities or targeted interventions.

Top 10 Vendors

Top 10 Products

Exploitability Metrics

An analysis of attack vector and privilege requirement distributions reveals a significant focus on unauthenticated, remote attacks. Most vulnerabilities mentioned in these logs require no user interaction.

Attack Vector Distribution

Privilege Requirement Distribution

User Interaction Distribution

Conclusion

These results offer a snapshot of an attacker’s view of the cybersecurity landscape as captured through the leaked Black Basta chat logs and underscore the importance of a threat-informed approach to vulnerability prioritization, considering various factors, including exploitation, age, and product importance, among others.

We recommend adopting more nuanced, context-sensitive approaches like the Stakeholder-Specific Vulnerability Categorization (SSVC) introduced by CISA. SSVC proposes a decision tree model that allows for customized prioritization based on the threat landscape and the organization’s specific needs.

To help organizations allocate resources effectively and address the most risky vulnerabilities, we have been publishing weekly blog posts since Week 32 of 2024 (end of July), highlighting the top 5 vulnerabilities each week. This prioritization is based on a decision-tree model trained on over 150,000 vulnerabilities. Approximately 25,170 vulnerabilities were published during this period, of which we have shortlisted 309. Follow our regular updates for more!

All Rights Reserved by ENTRYZERO GmbH

Website by Sanico Software

IMPRINT: ENTRYZERO GmbH, Konrad-Zuse-Straße 18, 44801 Bochum, Registered Office: Bochum, Registration Court: Local Court Bochum, Registration number: HRB 21709, VAT ID: DE369315057, Managing Directors: Dr. Mohamad Sbeiti, Samet Gökbayrak, Tel.: +49 234 94426026, Email: info@entryzero.ai

PRIVACY POLICY: This website does not collect any personal data. We do not use cookies, trackers, forms or similar technologies. However, by visiting our website you agree that for every site request the following non-personal information is stored on the webserver for statistical, intrusion detection/prevention and troubleshooting purposes: requested address (URL), request date and time, client IP address, user-agent and referer. No information is given to or shared with third parties

Logo of the German Ministry