[BLACKBASTA] – Ransomware Victim: btci[.]com

image

Ransomware Group: BLACKBASTA

VICTIM NAME: btci[.]com

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the BLACKBASTA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The recent ransomware leak involving BT Group plc, a prominent telecommunications provider in Europe, poses significant concerns as it exposes sensitive data. The leak page indicates that approximately 500GB of data has been compromised, which includes various types of financial information, organizational data, user details, personal documents, and confidential materials such as non-disclosure agreements (NDAs). The breach was discovered on December 4, 2024, and has resulted in a total of eight users being impacted. This situation highlights the vulnerabilities faced within the technology sector and raises awareness regarding data protection measures.

The leak page sources originate from the group’s dark web presence, associated with the ransomware group known as Black Basta. BT Group plc’s telecommunications services encompass a wide range of functions, making the leaked data particularly valuable for cybercriminal activities. The breach also implies a systematic compromise, as it reportedly contains detailed information about the organization’s operations and user accounts. While there are specific URLs pointing to the leak, they have been omitted for security reasons. The presence of screenshots on the leak page signifies visual evidence of the data breach, further underlining the severity of the incident.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.