{"id":208980,"date":"2025-03-18T04:12:40","date_gmt":"2025-03-18T09:12:40","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/03\/ransomware-gang-creates-tool-to-automate-vpn-brute-force-attacks"},"modified":"2025-03-18T04:12:40","modified_gmt":"2025-03-18T09:12:40","slug":"ransomware-gang-creates-tool-to-automate-vpn-brute-force-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/03\/ransomware-gang-creates-tool-to-automate-vpn-brute-force-attacks","title":{"rendered":"Ransomware gang creates tool to automate VPN brute-force attacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/ransomware-gang-creates-tool-to-automate-vpn-brute-force-attacks.jpg\"><\/a><\/p>\n<p>The Black Basta ransomware operation created an automated brute-forcing framework dubbed \u2018BRUTED\u2019 to breach edge networking devices like firewalls and VPNs.<\/p>\n<p>The framework has enabled BlackBasta to streamline initial network access and scale ransomware attacks on vulnerable internet-exposed endpoints.<\/p>\n<p>The discovery of BRUTED comes from EclecticIQ researcher <a href=\"https:\/\/twitter.com\/WhichbufferArda\" target=\"_blank\" rel=\"nofollow noopener\">Arda B\u00fcy\u00fckkaya<\/a> following an in-depth examination of the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/black-basta-ransomware-gang-s-internal-chat-logs-leak-online\/\" target=\"_blank\" rel=\"nofollow noopener\">ransomware gang\u2019s leaked internal chat logs<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Black Basta ransomware operation created an automated brute-forcing framework dubbed \u2018BRUTED\u2019 to breach edge networking devices like firewalls and VPNs. The framework has enabled BlackBasta to streamline initial network access and scale ransomware attacks on vulnerable internet-exposed endpoints. The discovery of BRUTED comes from EclecticIQ researcher Arda B\u00fcy\u00fckkaya following an in-depth examination of the [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418,6],"tags":[],"class_list":["post-208980","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/208980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=208980"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/208980\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=208980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=208980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=208980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}