Search
Close this search box.

Black Basta Leaks, B1ack’s Stash, & Billions of Stealer Log Records

Featured image: Feb cybercrime update
February may be the shortest month of the year, but it was still jam-packed with cybercrime news. This month brings us some positive news for cyber defenders…and more of the usual from the criminal underground.
In this edition of our monthly cybercrime update, we’ll get into the good, including:
And on the less-positive side of things, we analyze:

Without further ado, let’s dig in.

Major Cybercrime Events This Month

4 Million Free (Stolen) Credit Cards

In April 2024, a new carding marketplace, B1ack’s Stash, launched and attempted to entice users to register on their site by offering 1 million stolen credit cards for free. In February 2025, they ran a similar marketing campaign, this time offering 4 million free cards to anyone who created at least a “Level 1” account on the website.

After downloading this new dataset of 4 million credit cards and de-duplicating the data, SpyCloud Labs analysts concluded that there appear to be only around 10,000 unique cards contained in this dataset. A large portion of these cards appear to belong to cardholders from Southeast Asia.

Across all of the “freebies” posted to the B1ack’s Stash site, there are just over one million unique credit card records, which include the credit card number, and other information like the CVV, expiration date, cardholder name, and other cardholder details. These freebies and datasets of “millions of free cards” all function as marketing campaigns to drive new users to register on the B1ack’s Stash website and purchase premium offerings.

Image 1: Screenshot from the B1ack’s Stash website showing credit card
Image 1: Screenshot from the B1ack’s Stash website showing credit card data and “fullz” (detailed identity information used for financial fraud and identity theft) available for sale

All Your ALIEN TXTBASE Are Belong To Us

In the past week, a dark web data source called ALIEN TXTBASE has been highlighted by cybersecurity researchers and news outlets. ALIEN TXTBASE is a Telegram channel that distributes URL:log:pass (ULP) combolists, large lists of credentials consisting of URLs, email/username logins, and passwords that are usually derived from stealer logs, but are not themselves stealer logs. This Telegram channel currently contains over 700 of these ULP combolists that have been posted by the channel operators over time, containing billions of records in total.

What’s in a stealer log?

A stealer log is a bundle of stolen information taken from a single device that has been infected with infostealer malware. The exact stolen data varies depending on the malware strain, but it almost always includes sensitive information stored in the browser – like passwords, cookies, and saved credit card information – as well as detailed user and device information about the infected device. Additionally, these logs can include a wide variety of additional sensitive data stolen from the infected device, like desktop files, data stored in notes applications, and profiles for desktop applications like Steam and Discord. Stealer logs are often distributed and sold online in darknet forums and marketplaces; the logs are purchased by other threat actors who use the stolen credentials to perpetrate additional intrusions.

The credentials in ULP combolists are usually derived by pulling just the login credential information out of a large collection of stealer logs and aggregating it all together, which strips out most of the context. Often, data is also mixed in from different sources like breaches or even other combolists compiled by separate threat actor groups.

After examining a sample of the ULP data from the ALIEN TXTBASE source, we observed significant overlap (over 60%) with existing stealer log data in SpyCloud’s platform. We also observed even greater overlap (over 80%) with other combolists from other sources, indicating that the data is not particularly unique or fresh, even if a lot of it might have been originally derived from infostealer infections.

Additionally, we see records without associated URLs as well as some evidence of fabricated data, indicating that there may be some amount of data mixed in from breaches or generated using credential-guessing tools like password-similarity models, which fabricate possible alternative credentials based on known existing credentials. 

Image 2: ALIEN_LOG ASCII art showing their various Telegram channels, including the ALIEN TXTBASE channel with ULP combolists and an ALIEN LOGS CLOUD channel containing full stealer logs

The ALIEN TXTBASE channel itself offers free ULP combolist data to advertise other premium offerings, including an ALIEN LOGS CLOUD channel, which contains full stealer logs. SpyCloud Labs is continuing to monitor this data source, as well as other similar data sources that distribute both ULP combolists and infostealer logs.

Yet Another Doxbin Leak

On February 11, the TOoDA hacking group took control of the Doxbin website, purged accounts, and leaked site user and administrative data. Doxbin is a pastebin-style website where users are encouraged to dox others (aka posting someone’s personal information online in an attempt to get others to harass them).

There have been multiple Doxbin leaks in the past, including leaked Doxbin user tables containing usernames, emails, and hashed passwords. Additionally, some threat actors also scraped Doxbin and redistributed Doxbin posts as a dataset.

However, what sets this most recent Doxbin leak apart is a spreadsheet of “Blacklist Data,” which appears to be a detailed accounting of Doxbin posts for which the doxxed individuals paid the Doxbin site administrators to have a post containing their personal data taken down. The spreadsheet appears to contain data from some celebrities as well as quite a few cybercriminals. The spreadsheet contains the data from the removed post as well as the email address or Telegram account username used to request the takedown.

Image 3: Screenshot showing Doxbin’s “Removal Request Guidelines,” which state that Doxbin may charge individuals a “small fee” to take down posts containing their personal data.

Websites like Doxbin highlight how stolen identity data doesn’t just threaten the security of user accounts and enterprise networks, but can also pose a threat to the personal safety and security of individuals. Breached, leaked, and stolen PII can be weaponized to digitally and physically harass individuals on top of being leveraged for cybercrimes like fraud.

Arrests of Phobos and 8Base Ransomware Operators

Image 4: Law enforcement takedown notice posted to the 8Base ransomware leak site.
Image 4: Law enforcement takedown notice posted to the 8Base ransomware leak site.

On February 10, an international group of law enforcement agencies seized 27 servers belonging to the 8Base ransomware group and arrested four individuals associated with the group who are suspected of deploying 8Base ransomware. In Europol’s press release on the takedown, they also highlight previous arrests by the same group of law enforcement agencies of other key figures associated with Phobos ransomware (both affiliates and administrators).

8Base’s ransomware was originally based on Phobos, but the malware has since evolved over time as its operators have made changes to their codebase. This group of law enforcement agencies appears to have closely coordinated their investigations into both Phobos and 8Base. This approach more realistically mirrors the rapid rebranding, splintering, and offshooting that occurs among ransomware groups, often as a purposeful tactic to confuse and evade law enforcement and cybercrime researchers.

TL;DR of new SpyCloud Labs research

Over the past few months, we’ve observed threat actors using some interesting strategies to filter out “junk” data in their phishing campaigns. Specifically, this blog takes a deep dive into a phishing gateway page that we’ve observed phishers deploy as a method to filter out bad data inputs by validating user-submitted data against the targeting list for a phishing campaign. This phishing gateway page acts as a simple but effective tool that phishing operators use to filter out unwanted users, bots, and security scanning tools from reaching their main phishing pages.

Current & Forthcoming Cybercrime Research

Black Basta Integrated Known Stealers with Their Ransomware Operation

On February 11, 2025, a Telegram account called ExploitWhispers leaked a large dump of internal Matrix chat records from the Black Basta ransomware group. The leak appears to include their internal communications from September 2023 through September 2024. Totaling nearly 200k messages, these leaks provide a treasure trove of information, including insights into the group’s organizational structure, infrastructure, tooling, vulnerability exploitation activity, and personal identities.

gg chat

Our ad-hoc token clustering analysis on the leaked Black Basta chats, integrated with ground truth and a bit of RUMINT, illustrates the potential roles of some key members of the Black Basta operation (image 5). Key tokens are loosely aligned along the kill chain, demonstrating some fuzzy grouping of the members from initial access to actions-on-objectives. More thorough, qualitative analysis on each member was performed by an independent security researcher, bencrypted.

Image 5: Black Basta chat account users and their keyword groupings. The tokens are aligned to follow a simplified version of the kill chain for a ransomware incident, with words referring to initial access in different shades of green, intrusion actions in shades of orange and yellow, and actions on objectives in shades of red.

Unlike Conti, another ransomware group whose chat logs were leaked early in 2022, Black Basta kept a tightly closed affiliate model with few active members. Leadership for Black Basta falls largely on gg, who is involved in making judgment calls all along the kill-chain. RUMINT suggests that gg is Tramp, a threat actor best known for his attempted revival at the Emotet botnet. Throughout 2022, Black Basta was a known endgame of Qbot (also known as Qakbot), a popular loader malware that was disrupted by law enforcement in August 2023.

gg chat

Black Basta has also been observed using other initial access vectors, including Pikabot, vulnerability exploitation, and the use of valid credentials. Valid credentials can facilitate initial access, persistence, and lateral movement.

  1. Specifically, organizations should enhance existing playbooks to include a comprehensive post-infection remediation approach to make sure that – beyond wiping the device clean of the initial stealer – the accounts and credentials tied to the device are remediated and active session cookies closed to ensure any stolen data can not be used for further invasive access to networks and systems.
  2. Vet online sources to verify legitimacy
  3. Don’t download free or cracked software
  4. Verify source when receiving email attachments
Ensure MFA is configured correctly following vendor guidelines. Improperly configured enrollment is easy for threat actors to bypass.

In the Black Basta chat logs, there is strong evidence that the use of valid credentials in Black Basta ransomware intrusions was facilitated by Black Basta’s stealer integration, which allows team members to bring stealer logs directly into attack orchestration.

Image 6: Stealer log mentions, including direct posts of stealer logs.
Image 6: Stealer log mentions, including direct posts of stealer logs.

Mentions of infostealer malware, Lumma consisted mostly of .exe and .zip filenames following burito’s suggestion that they wrap the stealer with a crypter (image 6). Stealer logs were also directly shared in the leaked Matrix chats from a handful of stealers with an emphasis on Meduza stealer. Valid credentials have been repeatedly targeted by ransomware groups for initial access, and blue teams often find correlations between accounts found in stealer logs and those leveraged in ransomware incidents. Here, we see an explicit relationship, including specific tooling in the Black Basta panel to support the integration between stealers and active ransomware operations.

Burito chat

Darcula Phishing-as-a-Service

The Phishing-as-a-Service (PhaaS) operators of the Darcula phishing kit have released a “V3” of their kit, making it even easier for non-technical cybercriminals to conduct targeted phishing campaigns.

Darcula is a phishing kit created by Chinese-speaking cybercriminals that allows less technical users to set up sophisticated phishing pages and launch smishing campaigns. Earlier versions of Darcula were known for having pre-built phishing campaign templates for a wide variety of global brands, enabling their customers to easily launch convincing smishing campaigns such as “missing package” campaigns impersonating the postal services for various countries around the world.

The V3 version of Darcula has a particularly novel new feature: phishing kit generation. Essentially, any Darcula user can create their own phishing kit to impersonate any brand simply by inserting the URL of the brand’s legitimate website into the Darcula suite. Then, as researchers at Netcraft reported, the platform appears to use a browser automation tool to export the webpage and associated assets like logos and fonts. Darcula users can then choose a scam template based on the specific types of data they want to phish, make any stylistic changes to make sure the phishing page(s) look legitimate and match the impersonated brand’s website, and finally export the new custom phish kit.

Image 7: Messages from the Darcula administrators on Telegram announcing
Image 7: Messages from the Darcula administrators on Telegram announcing
Image 7: Messages from the Darcula administrators on Telegram announcing the new “V3” of their product. On the left is the original post in Chinese, and on the right is a version that has been translated using Telegram’s translation feature.
Simple, user-friendly PhaaS tools lower the barrier to entry to conducting cybercrime. At SpyCloud Labs, we refer to the broad ecosystem of tools and services that empower even low-skill threat actors to conduct sophisticated cyber attacks as cybercrime enablement services. Darcula V3 specifically enables cybercrime by allowing anyone to create and deploy a polished, custom phishing campaign that convincingly impersonates any brand of their choice without requiring any specialized web development skills.

SpyCloud Labs will continue to monitor Darcula and other PhaaS activity and provide updates as available.

Coming Soon: The 2025 SpyCloud Annual Identity Exposure Report

Last but not least, the SpyCloud team has been hard at working compiling our annual analysis of identity exposure trends. This year’s report includes:

Subscribe below to be one of the first to get the full report in your inbox and in the meantime, you can look back at last year’s report to get a sense of what to expect.

SpyCloud’s recaptured data collection numbers

February Monthly Total

Total New Recaptured Data Records for February:
2,036,699,103

New Recaptured Third-Party Breach Data this Month

Third-Party Breaches Parsed and Ingested:
355
New Data Records from Third-Party Breaches:
783,869,234

New Recaptured Infostealer Malware Data this Month

Unique Infostealer Infection Logs Parsed:
3,307,807
New Data Records from Infostealer Infections:
25,567,052
New Stolen Cookie Records:
1,227,262,817

New Infostealer Malware Families

PXRECVOWEIWOEI: PXRECVOWEIWOEI, also known as 0bj3ctivityStealer, is an infostealer that targets Windows devices. It steals user system information, passwords, credit card details, autofill data, cookies, application profile information for messaging and gaming applications, and other sensitive data. It can also take screenshots of the desktop and webcam.

PureLogs Stealer: PureLogs is an infostealer developed by a threat actor named PureCoder. PureCoder offers a variety of different types of malware, which can be purchased through subscription services, including PureCrypter, PureMiner, BlueLoader, and PureHVNC.

Braodo Stealer: Braodo is an infostealer that is written in Python. It uses Telegram bots for command-and-control (C2) and data exfiltration.

Unidentified Delphin Stealer: This month, we also started ingesting data from a new stealer log format that we have not yet identified. We are tracking the yet-to-be-identified Windows infostealer that produces these logs as “Unidentified Delphin Stealer.”

Stay in the Loop

Sign up to get the latest cybercrime research, insights, and best practices in your inbox

Keep reading

Discover the biggest wins from 2024 against cybercrime—from major infostealer takedowns to global ransomware crackdowns—and what they mean for the future of cybersecurity.
Headline-making breaches in 2024 exposed millions of records, compromising sensitive data. This blog explores what was stolen and the impact that has on security strategies to stay ahead.
Bad actors use phishing gateway pages to screen and validate stolen data. Learn how they work and how to protect yourself from these attacks.
Check your darknet exposure

Check Your Company's Exposure

See your real-time exposure details powered by SpyCloud.

The SpyCloud 2025 Annual Identity Exposure Report is in orbit. 🚀 Read the full report here >>

X