Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Embargo Gang Made $34M in a Year

August 12, 2025
Reading Time: 3 mins read
in News
Chrome Sandbox Escape Earns $250K

A new and highly capable ransomware group called Embargo has emerged, and researchers believe it could be the successor to the now-defunct BlackCat/Alphv operation. Since mid-2024, Embargo has quickly established itself, amassing an estimated $34.2 million in cryptocurrency from its victims. The group’s rapid financial growth and technical sophistication have drawn the attention of cybersecurity experts, who are closely monitoring its activities. The connection to BlackCat is based on several key similarities, including the infrastructure of their cryptocurrency wallets, suggesting a direct link between the two operations.

Like its predecessor, Embargo operates on a ransomware-as-a-service (RaaS) model. In this setup, the core group develops and maintains the ransomware tools, which are then distributed to a network of affiliates. These affiliates carry out the actual cyberattacks, and when a ransom is paid, a portion of the profits is funneled back to the central Embargo operation. This business model allows the group to scale its attacks rapidly and cast a wide net, targeting a diverse range of sectors and geographies without having to execute every attack themselves.

One of the key differences noted by researchers is Embargo’s centralized control over its operations. While affiliates conduct the initial attacks, Embargo retains authority over critical functions, such as infrastructure management and ransom negotiations with victims. This approach provides the group with a high degree of control and coordination, ensuring that all aspects of the attack, from deployment to payment, are handled efficiently. This tight control also allows them to maintain a more consistent and aggressive negotiation strategy, contributing to their significant financial gains.

Embargo’s primary targets include companies in the healthcare, business services, and manufacturing sectors. Ransom demands have been substantial, with some reaching as high as $1.3 million. The group has already claimed responsibility for several high-profile attacks, including one on a Georgia hospital and another on a California health system. These incidents highlight the serious threat Embargo poses, particularly to critical infrastructure and organizations that handle sensitive data.

Despite its rapid rise and significant financial success, Embargo has so far avoided the high-visibility tactics of more prominent ransomware gangs like LockBit and Clop. The group maintains a relatively low profile, shunning practices like triple extortion and public victim harassment. This strategic subtlety may be a deliberate effort to avoid drawing too much attention from law enforcement and government agencies, allowing them to continue their operations with less interference. However, its growing financial footprint and technical prowess suggest that Embargo is a force to be reckoned with in the evolving landscape of cybercrime.

Reference:

  • Embargo Ransomware Gang Netted $34M in Just Over a Year
Tags: August 2025Cyber NewsCyber News 2025Cyber threats
ADVERTISEMENT

Related Posts

Cox Confirms Oracle Hack As Victims Named

Google Adds AirDrop Support To Android

November 24, 2025
Cox Confirms Oracle Hack As Victims Named

Scattered Spider Members Deny TfL Charges

November 24, 2025
Cox Confirms Oracle Hack As Victims Named

Microsoft To Remove WINS After 2025

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Crypto Mixer Founders Jailed for Laundering

November 21, 2025
Salesforce Breach Hits Over 200 Victims

TV Piracy Service With 26M Visits Closed

November 21, 2025
Almaviva Leak Exposes FS Group Data

SEC Ends SolarWinds Case After Years

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial