Payouts King appears to carry forward Black Basta’s playbook with a sharper ransomware package


A ransomware group called Payouts King has emerged as a credible threat, and Zscaler says several recent attacks tie back with high confidence to operators consistent with former Black Basta initial access brokers. The company’s researchers say those intrusions reused Black Basta-style social engineering, especially spam bombing, Microsoft Teams impersonation, and Quick Assist abuse, before deploying Payouts King ransomware for data theft and selective encryption.

That link matters, but it needs careful wording. Zscaler does not say Payouts King is simply Black Basta under a new name. It says some attacks in early 2026 matched activity from previous Black Basta access brokers and that several of those attacks were attributed to Payouts King with high confidence. That is stronger than a vague similarity claim, but narrower than saying the whole group fully replaced Black Basta.

The Black Basta background is real. Public reporting and later analysis show the group’s internal chats leaked in February 2025, which exposed operations and added pressure on the gang’s ecosystem. Security researchers have since tracked follow-on activity from actors believed to be tied to that network.

How the attacks begin

According to Zscaler, the intrusions often start with spam bombing that floods a victim’s inbox with junk mail. The attackers then contact the target through Microsoft Teams while posing as internal IT staff and steer them into using Quick Assist, a legitimate Windows remote-support tool. Once they gain remote access, they move quickly to deploy malware, steal data, and later run the ransomware stage.

That sequence matches a broader trend seen in other research on suspected former Black Basta operators. ReliaQuest has also described attacks that begin with inbox flooding and shift into Teams-based fake IT contact within minutes, which supports Zscaler’s account of the social-engineering chain.

The social-engineering angle matters because it lets attackers bypass many defenses without exploiting a software flaw first. If a user hands over remote access through a trusted Microsoft tool, the attackers can blend into ordinary help-desk behavior long enough to establish a foothold.

What Payouts King does after access

Zscaler says Payouts King steals large amounts of data and then selectively encrypts files, rather than blindly locking everything it can reach. The group also runs a Tor-based leak site and drops a ransom note called readme_locker.txt with contact details through TOX, which fits the now-standard double-extortion model used across much of the ransomware ecosystem.

Payouts King ransomware data leak site (Source – Zscaler)

On the encryption side, Zscaler says the malware uses 4,096-bit RSA together with 256-bit AES in CTR mode. For large files, it speeds execution by splitting data into 13 blocks and only partially encrypting each one, a technique that helps attackers finish the operation faster before defenders can react.

The malware also appears built to frustrate analysis. Zscaler says it uses stack-based string encryption, hashed Windows API resolution, a custom CRC routine, and an anti-sandbox check that requires a specific identity parameter before encryption will start. That design helps the ransomware avoid easy detonation in automated analysis systems.

Why defenders should pay attention

Payouts King does not look like a crude copycat. Zscaler’s write-up presents it as a technically mature ransomware family with careful evasion, selective encryption, and a social-engineering chain that already worked well for earlier Black Basta-linked actors. That combination makes it more dangerous than a new name with recycled branding.

The use of Teams impersonation and Quick Assist also creates a practical problem for defenders. These are normal enterprise tools, so blocking them outright can disrupt support operations. That means organizations need tighter policy controls around who can initiate remote support, who can contact employees as IT, and how help-desk identity gets verified. This is an inference drawn from the tooling and access pattern described by Zscaler and ReliaQuest.

Example of Payouts King ransomware note (Source – Zscaler)

The timing also matters. With Black Basta’s old ecosystem fractured after the 2025 leak, defenders should expect splinter groups and former affiliates to keep reappearing under new labels while preserving old tactics. Payouts King fits that pattern closely, even if the precise organizational structure behind it remains partly opaque.

Key details at a glance

ItemDetails
GroupPayouts King
Main linkZscaler ties some early 2026 attacks to activity consistent with former Black Basta access brokers
Initial accessSpam bombing, fake IT contact in Microsoft Teams, Quick Assist abuse
Extortion modelData theft plus selective file encryption
Ransom notereadme_locker.txt
Contact methodTOX
Encryption4,096-bit RSA plus 256-bit AES-CTR
Anti-analysisString obfuscation, hashed API resolution, custom CRC, anti-sandbox parameter check
Post-encryption actionsDeletes shadow copies, clears recycle bin, wipes event logs

Source for the table: Zscaler ThreatLabz.

What organizations should do now

  • Train employees to treat spam bombing, unexpected Teams messages, and urgent remote-support requests as connected signs of a possible ransomware setup.
  • Restrict Quick Assist and similar remote tools to approved IT staff and documented support flows. Zscaler specifically calls out Quick Assist abuse in these attacks.
  • Require a second verification channel before any employee accepts remote-help requests that arrive through Teams or email. This directly addresses the impersonation stage described in the research.
  • Use behavior-based endpoint detection and proactive hunting for shadow-copy deletion, log wiping, and suspicious process termination attempts against security tools. Zscaler says Payouts King targets many antivirus and EDR processes through low-level system calls.
  • Prepare for data theft as well as encryption. Leak-site pressure remains part of the operation, so incident response should include containment of exfiltration paths and not only file recovery.

FAQ

Is Payouts King definitely Black Basta rebranded?

Not based on the public evidence cited here. Zscaler says several attacks were tied with high confidence to Payouts King and that the activity was consistent with previous Black Basta initial access brokers. That suggests overlap in operators or access networks, not a full one-line rebrand claim.

How do these attacks usually start?

Zscaler says they often begin with spam bombing, then move into fake IT contact through Microsoft Teams, followed by Quick Assist abuse to gain remote access.

What makes the ransomware itself notable?

Researchers say it combines strong encryption, partial encryption for speed, anti-sandbox checks, obfuscation, and aggressive efforts to terminate security software and erase recovery artifacts.

Why is Teams and Quick Assist abuse so effective?

Because both tools are legitimate and familiar in many workplaces. Attackers can blend social engineering with normal support workflows and reach a foothold before defenders realize the request was fake.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages