Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Law Enforcement Seizes BlackSuit Ransomware

July 28, 2025
Reading Time: 3 mins read
in News
Law Enforcement Seizes BlackSuit Ransomware

In a significant blow to cybercrime, a coordinated international law enforcement operation has seized the TOR data leak website of the BlackSuit ransomware group. A banner now greets visitors to the site, announcing its seizure by U.S. Homeland Security Investigations and featuring the logos of 17 collaborating law enforcement agencies and the cybersecurity firm Bitdefender. This action represents a major disruption for the group, which has been actively compromising networks and extorting victims since at least April 2023.

The BlackSuit operation is widely believed to be a direct evolution or rebrand of the Royal ransomware gang. U.S. authorities, including the FBI and CISA, have formally linked Royal to the infamous Russian-based Conti cybercrime group, a prolific and dangerous entity in the ransomware landscape. In an updated joint advisory from August 2024, the FBI and CISA officially noted the rebrand from “Royal” to “BlackSuit,” highlighting the continuity in their tactics, techniques, and procedures (TTPs). Unlike many ransomware-as-a-service (RaaS) models, BlackSuit operated as a more insular group without a broad network of affiliates, maintaining tight control over its operations.

The group employed a diverse range of methods to gain initial access to victim networks, including phishing campaigns, exploiting weak Remote Desktop Protocol (RDP) credentials, and leveraging vulnerabilities in public-facing applications. Once inside, BlackSuit actors utilized a sophisticated toolkit for reconnaissance and lateral movement, using tools like SharpShares to map networks and Mimikatz to harvest credentials. For command and control, they were observed using clients like PuTTY and OpenSSH, while tools such as Cobalt Strike and the Ursnif malware were used to exfiltrate massive amounts of stolen data before deploying the ransomware.

BlackSuit was known for targeting high-value organizations across critical infrastructure sectors, including healthcare, government, manufacturing, and commercial facilities. Their extortion tactics were aggressive, with ransom demands typically ranging from $1 million to $10 million, payable in Bitcoin. Communications were initially handled through a private .onion portal linked in the ransom note, but the group increasingly resorted to direct phone calls and emails to pressure victims. Failure to pay resulted in the public release of stolen sensitive data on their now-seized leak site.

The takedown of the BlackSuit site is a key victory for the #StopRansomware initiative, a U.S. government-led effort to combat the global ransomware threat. In their advisory, the FBI and CISA strongly encourage organizations to implement recommended security mitigations to defend against such attacks. The detailed report provides valuable Indicators of Compromise (IoCs) and detection methods, empowering network defenders to proactively identify and neutralize threats associated with both the legacy Royal and the rebranded BlackSuit ransomware operations.

Reference:

  • Authorities Take Down BlackSuit Ransomware Gang’s Darknet Sites in Coordinated Cybercrime Operation
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

Credit Card Fraud Ring Busted

November 5, 2025

Cybercrime Groups Join Forces

November 5, 2025

US Sanctions 10 North Korean Entities

November 5, 2025
Google Search AI Mode Knows Everything

Proton Launches Data Breach Observatory

November 4, 2025
Google Search AI Mode Knows Everything

Google AI Blocks 10B Scam Messages

November 4, 2025
Google Search AI Mode Knows Everything

Google Search AI Mode Knows Everything

November 4, 2025

Latest Alerts

Post SMTP Plugin Hijacks Admins

React Native CLI Flaw Exposed

Smudged Serpent Targets US Experts

CISA Warns Linux Flaw Exploited

China Linked Tick Exploits Lanscope

Nation State Hackers Deploy Airstalk

Subscribe to our newsletter

    Latest Incidents

    Hackers Target UK Water Suppliers

    Nikkei Data Breach Hits 17000

    Apache OpenOffice Denies Breach

    Cybercriminals Exploit Remote Monitoring

    Malibu Boats Australia Hit By Ransomware

    Balancer Suffers 128 Million Exploit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial