Cybersecurity Videos
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityVideosDEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen
Cybersecurity

DEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen

•December 31, 2025
0
DEF CON
DEF CON•Dec 31, 2025

Why It Matters

Understanding RaaS group structures, low‑cost tools, and rebranding patterns equips organizations to anticipate attacks, allocate resources effectively, and strengthen multi‑layered defenses against a threat that costs billions annually.

Key Takeaways

  • •Ransomware costs U.S. organizations $124 billion annually in each year
  • •BlackBasta charges affiliates up to $1 million yearly for access
  • •Email spam bomb services sold for as low as $9 per use
  • •Leaked internal chats revealed group hierarchy, affiliate ties, and tactics
  • •Activity plunge after February 2025 leak hints at disbanding or rebranding

Summary

John Dilgen, a cyber‑threat intelligence analyst at Reliquest, presented at DEF CON 33’s Recon Village a deep dive titled “Inside the Shadows: Tracking Ransomware‑as‑a‑Service (RaaS) Groups and Evolving Cyber Threats.” He framed the discussion around the staggering $124 billion annual ransomware cost to U.S. firms and the difficulty of staying ahead of constantly shifting threat actors.

Dilgen outlined the intelligence pipeline Reliquest uses: dark‑web leak sites, internal and external attack telemetry, and law‑enforcement notifications. He illustrated how these sources expose aliases, tactics‑techniques‑procedures (TTPs), affiliate recruitment, and even social‑media footprints of groups such as BlackBasta, a Russian‑speaking RaaS outfit that entered the scene in April 2022 and commands up to $1 million per year for affiliate access.

A striking example was the February 2025 internal chat leak, which revealed a parody‑style hierarchy, the leader “Trump” pushing higher ransom demands, and cross‑group collaborations with Quackbot and Rostafari. Dilgen also highlighted a low‑cost “email spam bomb” service advertised for $9 per campaign, underscoring how inexpensive tools enable low‑paid affiliates to launch massive phishing floods.

The takeaway for defenders is clear: threat intelligence must be operationalized into a proactive, layered security posture. Monitoring dark‑web marketplaces, correlating leaked communications, and anticipating rebranding—evidenced by BlackBasta’s post‑leak activity drop and possible evolution into the Chaos team—are essential to mitigate the expanding RaaS ecosystem.

Original Description

0

Comments

Want to join the conversation?

Loading comments...