- Numerous United Law Application Agencies to interrupt the black suit
- Ransomware operators had multiple seized websites
- Not arrests had been made
The famous Ransomware Blacksuit operator has had its infrastructure interrupted by an important campaign to apply the law.
As part of the action, the main Blacksuit website, which is accessed through the onion router (Tor), was disfigured and left with a banner generally supported by the police after the domain seizure.
“This site has been seized by US National Security Research as part of a coordinated investigation of international law,” said the Banner.
Medusa claims responsibility
The National Security of the United States, the United States Department of Justice (DOJ), the FBI and other agencies have not yet published an official announcement about the demolition, but the Department of Justice has confirmed that the action was part of the Checkmate operation.
In addition to the main site, other websites (including the filtration site and the negotiation site) were also closed.
This was an international operation, carried out by the United States Secret Service, the Dutch National Police, the German State Criminal Police Office, the National Crime Agency of the United Kingdom, the Frankfurt Attorney’s Office, the Department of Justice, the Ukrainian cyber police, Europol and others.
Bitdefender, a private cybersecurity company, also attended, saying: “We praise our laws of application of the law for their coordination and determination. Operations such as this reinforce the critical role of public associations-private associations in the monitoring, exposure and dismantling of ransomware groups that operate in the shadows.”
A report by the US Department of Health and Services.
Unfortunately, eliminating websites and taking advantage of infrastructure rarely stops ransomware attacks, simply slows them down a bit. In general, threat actors take a few weeks to recover and continue where they left it, and they will generally not stop until they are arrested.
Through Bleepingcomputer