Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality

GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality

Posted on July 15, 2025July 15, 2025 By CWS

A classy new ransomware-as-a-service operation has emerged with superior AI-powered negotiation capabilities and cell administration options, concentrating on organizations throughout healthcare, automotive, and industrial sectors.

GLOBAL GROUP, operated by risk actor “$$$”, has claimed 17 victims throughout a number of nations since its June 2025 launch, demonstrating speedy operational scaling by means of automated techniques and strategic partnerships with Preliminary Entry Brokers.

Key Takeaways1. GLOBAL GROUP launched in June 2025 as a rebranded Black Lock RaaS operation, claiming 17 victims throughout the US, UK, Australia, and Brazil.2. AI-powered negotiation system automates sufferer communications and permits non-English talking associates to demand seven-figure ransoms.3. Partnerships with Preliminary Entry Brokers and brute-force instruments concentrating on VPN/Outlook techniques speed up deployment whereas bypassing EDR detection.4. Cellular-friendly affiliate panel helps cross-platform ransomware builds with an 85% revenue-sharing mannequin to draw new operatives.

AI-Powered Negotiation System 

GLOBAL GROUP first appeared on June 2, 2025, when risk actor “$$$” promoted the operation on the Ramp4u cybercriminal discussion board. 

The group’s devoted leak website, accessible through Tor tackle vg6xwkmfyirv3l6qtqus7jykcuvgx6imegb73hqny2avxccnmqt5m2id[.]onion, initially listed 9 victims inside 5 days of launch. 

GLOBAL GROUP DLS hosted on the Tor community

By July 14, 2025, the operation had expanded to 17 confirmed victims spanning the USA, the UK, Australia, and Brazil.

EclecticIQ analysts assess with medium confidence that GLOBAL GROUP represents a rebranding of the Black Lock RaaS operation. 

Technical proof helps this connection, together with shared infrastructure hosted by Russian VPS supplier IpServer at IP tackle 193.19.119[.]4. 

An operational safety failure uncovered this infrastructure when the group’s API endpoint /posts leaked JSON metadata containing the true internet hosting setting particulars.

Malware evaluation reveals that GLOBAL GROUP makes use of a custom-made variant of the earlier Mamona ransomware, sharing the equivalent mutex key GlobalFxo16jmdgujs437. 

The present variant, compiled in Golang, employs ChaCha20-Poly1305 encryption and helps cross-platform deployment throughout Home windows, Linux, and macOS environments.

GLOBAL GROUP’s most distinctive function is its AI-driven negotiation panel, designed to help non-English-speaking associates in sufferer communications. 

Negotiation panel, risk actor calls for 1 million US {dollars}

This automated system will increase psychological strain throughout ransom negotiations and facilitates seven-figure fee calls for. Latest negotiations have proven calls for reaching $1 million USD (roughly 9.5 BTC).

The operation presents an 85% revenue-sharing mannequin to draw associates, positioning itself competitively towards different RaaS operators. 

A promotional video on the leak website showcases a complete affiliate panel supporting cell gadget administration, permitting operatives to conduct negotiations through smartphones. 

The platform helps customized ransomware builds for ESXi, NAS, BSD, and Home windows techniques whereas claiming to be “undetectable by EDR”.

GLOBAL GROUP accelerates operations by means of partnerships with Preliminary Entry Brokers (IABs), buying pre-compromised community entry somewhat than conducting preliminary infiltration. 

Risk actor “$$$” has acquired RDP entry to U.S. legislation companies and webshell entry to Linux-based SAP NetWeaver techniques. The operation notably targets edge community home equipment, together with Fortinet, Palo Alto, and Cisco VPN gadgets.

The group additionally makes use of brute-force instruments concentrating on Microsoft Outlook Net Entry and RDWeb portals, enabling speedy deployment whereas bypassing conventional endpoint detection techniques. 

This technique permits associates to deal with payload supply and extortion somewhat than community penetration, considerably lowering time-to-compromise.

Examine dwell malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:AIdriven, Enable, Functionality, Global, Group, Negotiation, Operators, RaaS

Post navigation

Previous Post: GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows
Next Post: Threat Actors Use SVG Smuggling for Browser-Native Redirection

Related Posts

Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Cyber Security News
Cybersecurity Industry Gains .7 Billion to Develop Cutting-Edge Protection Technologies Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies Cyber Security News
TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome Cyber Security News
The Future of Cybersecurity – Trends Shaping the Industry The Future of Cybersecurity – Trends Shaping the Industry Cyber Security News
Hackers Allegedly Claim Breach Of HSBC USA Customers’ Records Including Financial Details Hackers Allegedly Claim Breach Of HSBC USA Customers’ Records Including Financial Details Cyber Security News
Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News