Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized

Posted on July 25, 2025July 25, 2025 By CWS

A significant win in opposition to cybercrime occurred this week, as authorities from all over the world teamed as much as take down key web sites run by the BlackSuit ransomware gang.

For those who go to the group’s knowledge leak website or their negotiation portal now, you’ll solely see a big discover stating that the location has been seized by regulation enforcement. This was accomplished as a part of a joint crackdown referred to as “Operation Checkmate.”

For victims and cybersecurity consultants, that is actually excellent news. The BlackSuit gang used these websites to threaten individuals and companies they hacked. Right here’s the way it labored: After sneaking into a pc community, they’d lock up important recordsdata utilizing ransomware, making it unattainable for the proprietor to entry their very own knowledge.

Then, BlackSuit would steal delicate recordsdata and threaten to publish them on-line if the sufferer didn’t pay up. All this was dealt with via their secret web sites on the darkish net.

Nonetheless, now that these websites are underneath the authorities’ management, BlackSuit’s main technique of scaring victims and acquiring cash is gone.

They will’t talk privately with victims to strain them, they usually can’t leak stolen recordsdata to harm organizations or power them to pay. This makes it considerably tougher for BlackSuit to function its ransomware enterprise.

The discover left on the seized websites reveals the variety of companies that collaborated to deliver them down. A few of the teams listed are the U.S. Division of Homeland Safety, the FBI, Europe’s Europol, the UK’s Nationwide Crime Company (NCA), and police organizations from international locations like Germany, Ukraine, Lithuania, and Canada.

Seizure discover

There are additionally just a few personal companions listed, similar to cybersecurity agency Bitdefender, indicating that tech corporations and governments are collaborating greater than ever to fight hackers.

BlackSuit isn’t a brand new identify within the ransomware world. The group has been attacking hospitals, colleges, companies, and even native governments since early 2023. Some safety consultants imagine they had been beforehand often called the Royal ransomware gang or might have advanced from the notorious Conti group.

Taking down these web sites doesn’t imply the issue is totally solved, although. Sadly, cybercrime teams are inclined to resurface, usually underneath a brand new identify or with a barely altered rip-off. Nonetheless, police hope this makes issues extra sophisticated for them and provides victims hope that one thing can really be accomplished about ransomware.

On the finish of the day, this operation sends a robust message: messing with individuals’s knowledge and making an attempt to revenue from it received’t be tolerated, and police are prepared and capable of crew up throughout international locations to battle again. For now, a minimum of, it’s checkmate for BlackSuit.

Expertise quicker, extra correct phishing detection and enhanced safety for your small business with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:BlackSuit, Data, Leak, Negotiation, Portal, Ransomwares, Seized

Post navigation

Previous Post: Elephant APT Group Attacking Defense Industry Leveraging VLC Player, and Encrypted Shellcode
Next Post: Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques

Related Posts

Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Cyber Security News
Critical VMware Tools VGAuth Vulnerabilities Enable Full System Access for Attackers Cyber Security News
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials Cyber Security News
WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File Cyber Security News
Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins Cyber Security News
Auditing Data Access Controls for Privacy Regulation Adherence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News