Black Basta: Bedrohungsakteure in Deutschland

05.03.2025

Abhilash Hota
Ein kürzlich geleakter Chat-Log der Hackergruppe Black Basta gewährt seltene Einblicke in die dunklen Ecken der Cyberkriminalität in Deutschland. Unsere Analyse enthüllt, wie sich Hacker in internen Chats über Sicherheitslücken austauschen – welche Schwachstellen sie besonders ins Visier nehmen, welche Angriffsvektoren sie nutzen und welche Produkte besonders betroffen sind. Wir haben 51 Schwachstellen untersucht, die in diesen Gesprächen im Zusammenhang mit deutschen Domains erwähnt wurden. Die Ergebnisse zeichnen ein alarmierendes Bild der aktuellen Bedrohungslage und zeigen die Dringlichkeit einer richtigen Priorisierung zur Behebung von Schwachstellen.
Victim German Domains
This wordcloud showcases German domains targeted by the threat actor black basta.
Exploited Vulnerability Severity Distribution
Vulnerabilities with “Critical” severity account for less than 50% of the exploited ones, highlighting the limitations of a purely CVSS-centric approach to vulnerability prioritization.
Exploited Vulnerability Age
Analysis by year indicated a focus on newer vulnerabilities, with most vulnerabilities (CVEs) published between 2022 and 2024.
Common Weakness Distribution
The top weaknesses, as identified by CWE IDs, pointed to common risk areas. Path traversal, improper input validation, and memory safety vulnerabilities are the top 3 in these chat logs.
Availability of Exploit Code
A PoC (Proof-of-Concept) source analysis revealed the easy availability of public and commercial exploit code for the vulnerabilities. It overlaps among scanning tools and PoC sources.
Exploited Vendors and Products
Certain vendors and products consistently dominated the conversation. This insight may help stakeholders prioritize which entities to scrutinize for potential vulnerabilities or targeted interventions.
Exploitability Metrics
An analysis of attack vector and privilege requirement distributions reveals a significant focus on unauthenticated, remote attacks. Most vulnerabilities mentioned in these logs require no user interaction.
Conclusion
These results offer a snapshot of an attacker’s view of the cybersecurity landscape as captured through the leaked Black Basta chat logs and underscore the importance of a threat-informed approach to vulnerability prioritization, considering various factors, including exploitation, age, and product importance, among others.
We recommend adopting more nuanced, context-sensitive approaches like the Stakeholder-Specific Vulnerability Categorization (SSVC) introduced by CISA. SSVC proposes a decision tree model that allows for customized prioritization based on the threat landscape and the organization’s specific needs.
To help organizations allocate resources effectively and address the most risky vulnerabilities, we have been publishing weekly blog posts since Week 32 of 2024 (end of July), highlighting the top 5 vulnerabilities each week. This prioritization is based on a decision-tree model trained on over 150,000 vulnerabilities. Approximately 25,170 vulnerabilities were published during this period, of which we have shortlisted 309. Follow our regular updates for more!