Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Law Enforcement Seizes BlackSuit Ransomware

July 28, 2025
Reading Time: 3 mins read
in News
Law Enforcement Seizes BlackSuit Ransomware

In a significant blow to cybercrime, a coordinated international law enforcement operation has seized the TOR data leak website of the BlackSuit ransomware group. A banner now greets visitors to the site, announcing its seizure by U.S. Homeland Security Investigations and featuring the logos of 17 collaborating law enforcement agencies and the cybersecurity firm Bitdefender. This action represents a major disruption for the group, which has been actively compromising networks and extorting victims since at least April 2023.

The BlackSuit operation is widely believed to be a direct evolution or rebrand of the Royal ransomware gang. U.S. authorities, including the FBI and CISA, have formally linked Royal to the infamous Russian-based Conti cybercrime group, a prolific and dangerous entity in the ransomware landscape. In an updated joint advisory from August 2024, the FBI and CISA officially noted the rebrand from “Royal” to “BlackSuit,” highlighting the continuity in their tactics, techniques, and procedures (TTPs). Unlike many ransomware-as-a-service (RaaS) models, BlackSuit operated as a more insular group without a broad network of affiliates, maintaining tight control over its operations.

The group employed a diverse range of methods to gain initial access to victim networks, including phishing campaigns, exploiting weak Remote Desktop Protocol (RDP) credentials, and leveraging vulnerabilities in public-facing applications. Once inside, BlackSuit actors utilized a sophisticated toolkit for reconnaissance and lateral movement, using tools like SharpShares to map networks and Mimikatz to harvest credentials. For command and control, they were observed using clients like PuTTY and OpenSSH, while tools such as Cobalt Strike and the Ursnif malware were used to exfiltrate massive amounts of stolen data before deploying the ransomware.

BlackSuit was known for targeting high-value organizations across critical infrastructure sectors, including healthcare, government, manufacturing, and commercial facilities. Their extortion tactics were aggressive, with ransom demands typically ranging from $1 million to $10 million, payable in Bitcoin. Communications were initially handled through a private .onion portal linked in the ransom note, but the group increasingly resorted to direct phone calls and emails to pressure victims. Failure to pay resulted in the public release of stolen sensitive data on their now-seized leak site.

The takedown of the BlackSuit site is a key victory for the #StopRansomware initiative, a U.S. government-led effort to combat the global ransomware threat. In their advisory, the FBI and CISA strongly encourage organizations to implement recommended security mitigations to defend against such attacks. The detailed report provides valuable Indicators of Compromise (IoCs) and detection methods, empowering network defenders to proactively identify and neutralize threats associated with both the legacy Royal and the rebranded BlackSuit ransomware operations.

Reference:

  • Authorities Take Down BlackSuit Ransomware Gang’s Darknet Sites in Coordinated Cybercrime Operation
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

Smishing targets routers in Belgium 2025

Google Drive Gains AI Ransomware Guard

October 2, 2025
Smishing targets routers in Belgium 2025

Descope Raises 35M In Seed Extension

October 2, 2025
Smishing targets routers in Belgium 2025

Sendit Sued By FTC Over Kids Data

October 2, 2025
Microsoft Sentinel Unveils AI SIEM

Scattered Spider And ShinyHunters Shift

October 2, 2025
Microsoft Sentinel Unveils AI SIEM

UK Convicts Chinese Crypto Fraudster

October 1, 2025
Microsoft Sentinel Unveils AI SIEM

Microsoft Sentinel Unveils AI SIEM

October 1, 2025

Latest Alerts

Outlook Bug Causes Repeated Crashes

Smishing targets routers in Belgium 2025

MatrixPDF Toolkit Turns PDFs Into Lures

Tesla Fixes TCU Bug With USB Risk

Apple Pushes iPhone and Mac Updates

EvilAI Malware Posing As AI Tools

Subscribe to our newsletter

    Latest Incidents

    Allianz Life July Breach Hits 1.5M

    Dealership Software Breach Hits 766k

    Suffolk Website Down After Cyber-Attack

    WestJet Confirms Data Breach

    Ransomware Gang Recruits Reporter

    US Surveillance Hack Exposes Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial