Black Basta: Bedrohungsakteure in Deutschland

Image cover for blog post.

05.03.2025

Profile image of Abhilash Hota

Abhilash Hota

Ein kürzlich geleakter Chat-Log der Hackergruppe Black Basta gewährt seltene Einblicke in die dunklen Ecken der Cyberkriminalität in Deutschland. Unsere Analyse enthüllt, wie sich Hacker in internen Chats über Sicherheitslücken austauschen – welche Schwachstellen sie besonders ins Visier nehmen, welche Angriffsvektoren sie nutzen und welche Produkte besonders betroffen sind. Wir haben 51 Schwachstellen untersucht, die in diesen Gesprächen im Zusammenhang mit deutschen Domains erwähnt wurden. Die Ergebnisse zeichnen ein alarmierendes Bild der aktuellen Bedrohungslage und zeigen die Dringlichkeit einer richtigen Priorisierung zur Behebung von Schwachstellen.

Victim German Domains

This wordcloud showcases German domains targeted by the threat actor black basta.

Domain Wordcloud

Exploited Vulnerability Severity Distribution

Vulnerabilities with “Critical” severity account for less than 50% of the exploited ones, highlighting the limitations of a purely CVSS-centric approach to vulnerability prioritization.

CVSS Severity Distribution

Exploited Vulnerability Age

Analysis by year indicated a focus on newer vulnerabilities, with most vulnerabilities (CVEs) published between 2022 and 2024.

CVE Temporal Distribution

Common Weakness Distribution

The top weaknesses, as identified by CWE IDs, pointed to common risk areas. Path traversal, improper input validation, and memory safety vulnerabilities are the top 3 in these chat logs.

Top 10 CWEs

Availability of Exploit Code

A PoC (Proof-of-Concept) source analysis revealed the easy availability of public and commercial exploit code for the vulnerabilities. It overlaps among scanning tools and PoC sources.

Public Tooling

Exploited Vendors and Products

Certain vendors and products consistently dominated the conversation. This insight may help stakeholders prioritize which entities to scrutinize for potential vulnerabilities or targeted interventions.

Top 10 Vendors

Top 10 Products

Exploitability Metrics

An analysis of attack vector and privilege requirement distributions reveals a significant focus on unauthenticated, remote attacks. Most vulnerabilities mentioned in these logs require no user interaction.

Attack Vector Distribution

Privilege Requirement Distribution

User Interaction Distribution

Conclusion

These results offer a snapshot of an attacker’s view of the cybersecurity landscape as captured through the leaked Black Basta chat logs and underscore the importance of a threat-informed approach to vulnerability prioritization, considering various factors, including exploitation, age, and product importance, among others.

We recommend adopting more nuanced, context-sensitive approaches like the Stakeholder-Specific Vulnerability Categorization (SSVC) introduced by CISA. SSVC proposes a decision tree model that allows for customized prioritization based on the threat landscape and the organization’s specific needs.

To help organizations allocate resources effectively and address the most risky vulnerabilities, we have been publishing weekly blog posts since Week 32 of 2024 (end of July), highlighting the top 5 vulnerabilities each week. This prioritization is based on a decision-tree model trained on over 150,000 vulnerabilities. Approximately 25,170 vulnerabilities were published during this period, of which we have shortlisted 309. Follow our regular updates for more!

Alle Rechte vorbehalten von ENTRYZERO GmbH

Website by Sanico Software

IMPRESSUM: ENTRYZERO GmbH, Konrad-Zuse-Straße 18, 44801 Bochum, Sitz: Bochum, Registergericht: Amtsgericht Bochum, HRB Nr.: 21709, USt-IdNr: DE369315057, Geschäftsführer: Dr. Mohamad Sbeiti, Samet Gökbayrak, Tel.: +49 234 94426026, E-Mail: info@entryzero.ai

DATENSCHUTZERKLÄRUNG: Diese Website erhebt keine personenbezogenen Daten. Wir verwenden keine Cookies, Tracker, Formulare oder ähnliche Technologien. Durch den Besuch unserer Website erklären Sie sich jedoch damit einverstanden, dass bei jeder Seitenanfrage die folgenden nicht-personenbezogenen Informationen zu statistischen Zwecken, zur Erkennung/Verhinderung von Eindringversuchen und zur Fehlerbehebung auf dem Webserver gespeichert werden: angeforderte Adresse (URL), Anfragedatum und -uhrzeit, IP-Adresse des Clients, User-Agent und Referer. Es werden keine Informationen an Dritte weitergegeben oder mit Dritten geteilt

Logo of the German Ministry