Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized

Posted on July 25, 2025July 25, 2025 By CWS

A significant win in opposition to cybercrime occurred this week, as authorities from all over the world teamed as much as take down key web sites run by the BlackSuit ransomware gang.

For those who go to the group’s knowledge leak website or their negotiation portal now, you’ll solely see a big discover stating that the location has been seized by regulation enforcement. This was accomplished as a part of a joint crackdown referred to as “Operation Checkmate.”

For victims and cybersecurity consultants, that is actually excellent news. The BlackSuit gang used these websites to threaten individuals and companies they hacked. Right here’s the way it labored: After sneaking into a pc community, they’d lock up important recordsdata utilizing ransomware, making it unattainable for the proprietor to entry their very own knowledge.

Then, BlackSuit would steal delicate recordsdata and threaten to publish them on-line if the sufferer didn’t pay up. All this was dealt with via their secret web sites on the darkish net.

Nonetheless, now that these websites are underneath the authorities’ management, BlackSuit’s main technique of scaring victims and acquiring cash is gone.

They will’t talk privately with victims to strain them, they usually can’t leak stolen recordsdata to harm organizations or power them to pay. This makes it considerably tougher for BlackSuit to function its ransomware enterprise.

The discover left on the seized websites reveals the variety of companies that collaborated to deliver them down. A few of the teams listed are the U.S. Division of Homeland Safety, the FBI, Europe’s Europol, the UK’s Nationwide Crime Company (NCA), and police organizations from international locations like Germany, Ukraine, Lithuania, and Canada.

Seizure discover

There are additionally just a few personal companions listed, similar to cybersecurity agency Bitdefender, indicating that tech corporations and governments are collaborating greater than ever to fight hackers.

BlackSuit isn’t a brand new identify within the ransomware world. The group has been attacking hospitals, colleges, companies, and even native governments since early 2023. Some safety consultants imagine they had been beforehand often called the Royal ransomware gang or might have advanced from the notorious Conti group.

Taking down these web sites doesn’t imply the issue is totally solved, although. Sadly, cybercrime teams are inclined to resurface, usually underneath a brand new identify or with a barely altered rip-off. Nonetheless, police hope this makes issues extra sophisticated for them and provides victims hope that one thing can really be accomplished about ransomware.

On the finish of the day, this operation sends a robust message: messing with individuals’s knowledge and making an attempt to revenue from it received’t be tolerated, and police are prepared and capable of crew up throughout international locations to battle again. For now, a minimum of, it’s checkmate for BlackSuit.

Expertise quicker, extra correct phishing detection and enhanced safety for your small business with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:BlackSuit, Data, Leak, Negotiation, Portal, Ransomwares, Seized

Post navigation

Previous Post: Elephant APT Group Attacking Defense Industry Leveraging VLC Player, and Encrypted Shellcode
Next Post: Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques

Related Posts

Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware Cyber Security News
FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection Cyber Security News
Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server Cyber Security News
ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access Cyber Security News
Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested Cyber Security News
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News