BlackSuit ransomware gang’s darknet websites seized by police
多国警方联合行动查封了BlackSuit勒索软件团伙的暗网 extortion 网站,涉及17个执法机构和网络安全公司Bitdefender。该团伙自2023年活跃以来,涉嫌通过勒索索取超5亿美元赎金,并与Royal和Conti等犯罪组织有关联。部分成员已转向Chaos勒索软件活动。 2025-7-25 10:46:11 Author: therecord.media(查看原文) 阅读量:18 收藏

The BlackSuit ransomware gang’s darknet extortion sites were seized on Thursday in an operation involving police from more than nine countries.

A splashpage replacing the gang’s list of victims on its main TOR domain as well as its private negotiation pages states these sites have “been seized by U.S. Homeland Security Investigations” as part of a coordinated international operation.

It features the logos of 17 law enforcement entities alongside the cybersecurity company Bitdefender, giving pole position to Homeland Security Investigations (HSI), a part of the Immigration and Customs Enforcement agency that focuses on transnational crime. HSI did not immediately respond to a request for comment.

The BlackSuit gang, which is believed to have been operational since April/May 2023, was a private ransomware group that did not license its tooling to other criminals like ransomware-as-a-service (RaaS) schemes.

It is believed to be a rebrand of the Royal ransomware, as an advisory from the FBI and Cybersecurity and Infrastructure Security Agency (CISA) stated last year. The cybercriminals behind the Royal gang were believed to be connected to the Conti scheme, one of the most notorious and scrutinized communities in Russian cybercrime.

The joint advisory described BlackSuit as having demanded more than $500 million in extortion payments from its victims, which internationally are believed to include the Japanese medallion giant Kadokawa and Tampa Bay Zoo, one of the most popular zoos in the United States.

In April 2024, the gang claimed responsibility for an attack against the blood plasma collection organization Octapharma, which the American Hospital Association said “resulted in the temporary closure of almost 200 blood plasma collection centers” across the country.

Following the takedown, Cisco Talos Incident Response published research finding some of the BlackSuit gang had already gone on to form part of the Chaos ransomware scheme “based on similarities in the ransomware's encryption methodology, ransom note structure, and the toolset used in the attacks.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/blacksuit-ransomware-gang-website-takedown
如有侵权请联系:admin#unsafe.sh