被稱為Tramp的新的勒索軟件遵循與臭名昭著的黑色巴斯塔小組相同的攻擊模式,導致安全研究人員調查它是採用其方法的直接後繼者還是獨立的組或個人。

Black Basta分支機構已知,以利用利用漏洞,並濫用有效的憑證來獲得受害者網絡的初始接收。流浪漢使用的近乎相同的方法表明了共享基礎架構或人員的可能性。

記錄顯示了Tramp與Lockbit 2.0和3.0的連接,他的活動在2022年至少在28個與Lockbit有關-gesis/“”>鏈接到虛擬機。

His role in ransomware dates even further back, with a consistent use of the highly insecure password “123123″for file protection, a pattern observed across multiple ransomware groups, including REvil and Conti.

In 2021, Tramp was involved in a dispute within REvil’s affiliate program, where he lost access to the ransomware negotiation platform and sought arbitration on a well-known cybercriminal forum. Using the handle washingt0n32, he claimed to have “more than 10 years”of experience in penetration testing, indicating that his involvement in cybercrime extends beyond ransomware into broader hacking activities.

Leaked Black Basta Chat Logs Hint at Tramp’s Origins

Evidence linking Tramp to Black Basta comes from exposed leaked internal conversations between Black Basta affiliates shared by PRODAFT on X, a cyber threat intelligence company that specializes in proactive cybersecurity solutions.

聊天日誌揭示了關於贖金定價和攻擊策略的內部爭議,其中一位成員說:“我們需要標準化贖金百分比。 Custom pricing is leading to too many inconsistencies.”

The leak also confirmed Black Basta’s move toward more advanced encryption tools and targeted attacks, which researchers believe may have contributed to the development of Tramp.

With Tramp’s operational model aligning so closely with Black Basta’s, analysts are investigating whether former members of the now-diminished group have resurfaced under a new identity.

🔍 As part of our continuous monitoring, we’ve observed that BLACKBASTA (Vengeful Mantis) has been mostly inactive since the start of the year due to internal conflicts. Some of its operators scammed victims by collecting ransom payments without providing functional decryptors.…

— PRODAFT (@PRODAFT) February 20, 2025

Tramp’s Connection to REvil and the Evolution of Ransomware Operations

The rise of Tramp follows a pattern seen repeatedly in ransomware operations, where one group disappears only for another to take its place using near-identical tactics.在Black Basta之前,RESOMWARE的主要力量是Revil的,它的大規模攻擊

勒索軟件組

根據未命名的來源,與

該消息人士還告訴Lemagit,Tramp得到了俄羅斯情報服務的支持,並指出“他在俄羅斯擁有最好的保護。他在安全服務中有朋友。他甚至支付了FSB和Gru的費用”,“沒有人擁有這種錢或這種安全水平。”

他們的調查證實了很多證據,這表明Oleg Nefedov是Tremp。根據該報告,除Washingt0n32外,Tramp還使用了Pseudonyms P1JA,AA,GG。

nefedov據說很快就會年滿35歲,起源於俄羅斯瑪麗共和國的首都伊什卡·奧拉(Ioshkar-Ola)。他的背景包括對加密貨幣的濃厚興趣,這是他與BTC-E.com上的一個帳戶的聯繫所證明的,BTC-e.com是一種現已失去的加密貨幣交換,在2014年遭受了數據洩露。

2017年,他與俄羅斯雲礦業公司BiTSoft(一家都集中在以太坊,litecoin,litecoin和zccash,remote dumpord in of Dompord indopers in of Domenty insed in of Morder indote insed insed and in offeremian cloud compand of Bitsoft,他都在此中。他的早期財務記錄表明,BOTSOFT的收入適中,後來從另一家公司的Polis轉變為2024年之前的收入。

據報導,他早年的收入相對較低,但據報導,據報導,據報導,據報導,他仍然保持了豪華的生活方式,以驅動著豪華的高端汽車ES G級AMG G63 SUV。

至少從2022年開始,他據說他已經投資了全球業務的高端休息室,跨越了迪拜,阿布扎比,巴庫,莫斯科和巴厘島。據說他還建立了一個名為Rodina的慈善機構,意思是俄羅斯的“祖國”。

tramp的出現表明勒索軟件群體如何連續適應,採用了經過驗證的攻擊方法。

cybersecurity企業將較大的關注者與較大的零件相關聯,替換了較大的ransom and and and and ands and and and in nots and in nork and in nork and inst inl and inst inl and inl and in link and另一個勒索軟件組-代表有組織的網絡犯罪的持續發展。