FBI Seizes RAMP Cybercrime Forum
Summary
Hide ▲
Show ▼
The FBI has seized the RAMP cybercrime forum, a platform known for facilitating ransomware operations and other cybercriminal activities. The seizure includes both the forum's Tor site and its clearnet domain, ramp4u[.]io, which now display a seizure notice. The forum was a hub for ransomware gangs to advertise their operations and recruit affiliates. The seizure provides law enforcement with access to a significant amount of data tied to the forum's users, including email addresses, IP addresses, and private messages. This could lead to the identification and potential arrest of threat actors who failed to follow proper operational security (opsec). RAMP was created in 2021 by individuals linked to the now-defunct Babuk ransomware group and was administered by key operators such as Mikhail Matveev (also known as Orange, Wazawaka, and BorisElcin) and Stallman. The forum was a prime hub for various ransomware groups, including LockBit, ALPHV/BlackCat, Conti, DragonForce, Qilin, Nova, Radiant, and RansomHub. Following the seizure, Stallman confirmed there were no plans to rebuild the forum, indicating a significant disruption to the cybercriminal ecosystem. Additionally, the FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals to buy and sell hacking tools and stolen data. The forum had over 142,000 members and more than 215,000 messages between members as of December 2025. The seizure is part of an international joint operation coordinated by Europol, known as 'Operation Leak,' involving law enforcement agencies in 14 countries. The operation included the shutdown of LeakBase's domains, posting seizure banners, and warning members of the seizure. Law enforcement executed search warrants, made arrests, and conducted interviews in multiple countries. The seizure banner notes that the forum's database and all its contents, including IP logs and private messages, will be used for evidentiary purposes in future investigations. The domain nameservers have been switched to ns1.fbi.seized.gov and ns2.fbi.seized.gov. The operation involved around 100 enforcement actions worldwide, including measures against 37 of the most active users of the platforms. LeakBase was active since 2021 and had over 142,000 members, offering access to databases, a market for selling leaks, exploits, and other cybercrime services, and an escrow payment system.
Timeline
-
04.03.2026 19:44 3 articles · 1d ago
FBI Seizes LeakBase Cybercrime Forum
The FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals to buy and sell hacking tools and stolen data. The forum had over 142,000 members and more than 215,000 messages between members as of December 2025. The seizure is part of an international joint operation coordinated by Europol, known as 'Operation Leak,' involving law enforcement agencies in 14 countries. The operation included the shutdown of LeakBase's domains, posting seizure banners, and warning members of the seizure. Law enforcement executed search warrants, made arrests, and conducted interviews in multiple countries. The seizure banner notes that the forum's database and all its contents, including IP logs and private messages, will be used for evidentiary purposes in future investigations. The domain nameservers have been switched to ns1.fbi.seized.gov and ns2.fbi.seized.gov. The operation involved around 100 enforcement actions worldwide, including measures against 37 of the most active users of the platforms. LeakBase was active since 2021 and had over 142,000 members, offering access to databases, a market for selling leaks, exploits, and other cybercrime services, and an escrow payment system. LeakBase facilitated an illegal trade in stolen data, including stealer logs - archives of stolen credentials harvested through infostealer malware. LeakBase had around 32,000 posts and over 215,000 private messages sent by its users as of December 2025. Coordinated action on March 3 led to arrests, house searches, and 'knock-and-talk' interviews by police in the US, Australia, Belgium, Poland, Portugal, Romania, Spain, and the UK. Europol claimed 37 of the most active users of the platforms were targeted by police, as well as dozens more. Europol has vowed to continue tracing and unmasking offenders that used the site. Edvardas Šileris, head of Europol’s European Cybercrime Centre, stated that this operation shows that no corner of the internet is beyond the reach of international law enforcement.
Show sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
29.01.2026 15:05 1 articles · 1mo ago
RAMP Administrator Confirms No Plans to Rebuild
Stallman, the administrator of RAMP, issued an official comment regarding the RAMP seizure on January 28, confirming there were no plans to rebuild the forum. This decision is likely linked to concerns about his own freedom and the heightened scrutiny from law enforcement.
Show sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
29.01.2026 15:05 1 articles · 1mo ago
Impact of RAMP Takedown on Cybercriminal Ecosystem
The RAMP takedown represents a meaningful disruption to a core piece of criminal infrastructure. It is expected to mostly impact low-tier actors, disrupt distribution and sales for underground sellers, have minimal impact on top-tier groups, and reduce Russian security services' visibility into ransomware processes and sellers.
Show sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
28.01.2026 19:38 2 articles · 1mo ago
FBI Seizes RAMP Cybercrime Forum
The FBI has seized the RAMP cybercrime forum, a platform used to advertise a wide range of malware and hacking services, including ransomware operations. The seizure includes both the forum's Tor site and its clearnet domain, ramp4u[.]io, which now display a seizure notice. The forum was launched in July 2021 by a threat actor known as Orange, who was later identified as Russian national Mikhail Matveev. The seizure notice displays a taunting message using RAMP's own slogan and an image of Masha, a Russian cartoon character, winking. The domains linked to RAMP now redirect to seizure notices with FBI and DoJ seals and the nameservers have been updated to ns1.fbi.seized.gov and ns2.fbi.seized.gov.
Show sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
Information Snippets
-
The FBI seized the RAMP cybercrime forum, including its Tor site and clearnet domain.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The seizure notice displays a taunting message using RAMP's own slogan.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The forum was launched in July 2021 by a threat actor known as Orange, who also operated under the aliases Wazawaka and BorisElcin.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Orange was previously the administrator of the Babuk ransomware operation.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The individual behind the Orange and Wazawaka aliases was identified as Russian national Mikhail Matveev.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Matveev was indicted by the U.S. Department of Justice for his involvement in multiple ransomware operations, including Babuk, LockBit, and Hive.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The seizure notice displays a taunting message using RAMP's own slogan and an image of Masha, a Russian cartoon character, winking.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The domains linked to RAMP now redirect to seizure notices with FBI and DoJ seals and the nameservers have been updated to ns1.fbi.seized.gov and ns2.fbi.seized.gov.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
RAMP was created in 2021 by individuals linked to the now-defunct Babuk ransomware group.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Another key operator, known as 'Stallman,' was still the forum’s administrator when the takedown occurred.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Stallman played a central role in maintaining trust, enforcing rules, and managing the platform’s technical operations.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
RAMP was created by individuals closely affiliated with the Russian security services as a response to the ransomware-as-a-service (RaaS) sprawl.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
RAMP was a prime hub for new and low-to-mid-tier ransomware groups to promote themselves, offer services, and be as visible as possible.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Many notorious ransomware groups, including LockBit, ALPHV/BlackCat, Conti, DragonForce, Qilin, Nova, Radiant, and RansomHub, operated on this forum at various points.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Stallman issued an official comment regarding the RAMP seizure on January 28, confirming there were no plans to rebuild.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The RAMP takedown represents a meaningful disruption to a core piece of criminal infrastructure.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The RAMP takedown will mostly impact low-tier actors, disrupt distribution and sales for underground sellers, have minimal impact on top-tier groups, and reduce Russian security services' visibility into ransomware processes and sellers.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals to buy and sell hacking tools and stolen data.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
The seizure action is part of an international joint operation coordinated by Europol, known as 'Operation Leak,' involving law enforcement agencies in 14 countries.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
On March 3 and 4, the FBI and law enforcement agents shut down LeakBase by seizing two of its domains, posting seizure banners, and warning LeakBase members of the seizure after collecting further evidence.
First reported: 04.03.2026 19:442 sources, 2 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
-
Police officers and investigators executed search warrants, made arrests, and conducted interviews in the United States and across Australia, Belgium, Poland, Portugal, Romania, Spain, and the United Kingdom.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
LeakBase's domain (leakbase[.]la) now displays a notice stating 'This website has been seized by the Federal Bureau of Investigation (FBI) as part of an international law enforcement operation.'
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
The seizure banner notes that the forum's database and all its contents, including IP logs and private messages, will be used for 'evidentiary purposes' in future investigations.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
The domain nameservers have been switched to ns1.fbi.seized.gov and ns2.fbi.seized.gov, the nameservers used by the FBI when seizing domains.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
On 3 March, law enforcement authorities carried out coordinated enforcement actions across multiple jurisdictions, including arrests, house searches, and 'knock-and-talk' interventions. Around 100 enforcement actions were conducted worldwide, including measures against 37 of the most active users of the platforms.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
On 4 March, authorities moved to the technical disruption phase, seizing the forum's domain and replacing it with a law enforcement splash page. The operation now enters a prevention phase aimed at deterring further criminal activity and raising awareness of the consequences of engaging in cybercrime.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
Active since 2021, LeakBase was launched as a project supported by the ARES threat group, and it gradually grew its user base to more than 142,000 members following the closure of the Breached hacker forum.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
The forum was free to join and offered access to databases, a market for selling leaks, exploits, and other cybercrime services, and an escrow payment system. In addition, it also hosted spaces for programming, hacking tips, social engineering, cryptography, and opsec guides.
First reported: 04.03.2026 19:443 sources, 3 articlesShow sources
- FBI seizes LeakBase cybercrime forum, data of 142,000 members — www.bleepingcomputer.com — 04.03.2026 19:44
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
LeakBase had over 215,000 messages between members as of December 2025.
First reported: 05.03.2026 08:342 sources, 2 articlesShow sources
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
LeakBase offered hacked databases, including hundreds of millions of account credentials and financial information.
First reported: 05.03.2026 08:341 source, 1 articleShow sources
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
-
LeakBase explicitly prohibited users from peddling or publishing Russian databases.
First reported: 05.03.2026 08:341 source, 1 articleShow sources
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
-
LeakBase is one of the aliases for Chucky, who also goes by the monikers Chuckies and Sqlrip across various underground forums.
First reported: 05.03.2026 08:341 source, 1 articleShow sources
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
-
Chucky has a track record of sharing vast collections of databases, often containing sensitive information from global entities.
First reported: 05.03.2026 08:341 source, 1 articleShow sources
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
-
Other known administrators and moderators of LeakBase include BloodyMery, OrderCheck, and TSR.
First reported: 05.03.2026 08:341 source, 1 articleShow sources
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
-
LeakBase specialized in the sale of stealer logs, which contain archives of credentials harvested through infostealer malware.
First reported: 05.03.2026 08:342 sources, 2 articlesShow sources
- FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials — thehackernews.com — 05.03.2026 08:34
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
LeakBase facilitated an illegal trade in stolen data, including stealer logs - archives of stolen credentials harvested through infostealer malware.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
LeakBase had around 32,000 posts and over 215,000 private messages sent by its users as of December 2025.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
Coordinated action on March 3 led to arrests, house searches, and 'knock-and-talk' interviews by police in the US, Australia, Belgium, Poland, Portugal, Romania, Spain, and the UK.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
Europol claimed 37 of the most active users of the platforms were targeted by police, as well as dozens more.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
Europol has vowed to continue tracing and unmasking offenders that used the site.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
Edvardas Šileris, head of Europol’s European Cybercrime Centre, stated that this operation shows that no corner of the internet is beyond the reach of international law enforcement.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
Operation Leak is the latest attempt to disrupt a flourishing trade in stolen data, driven by infostealer activity.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
A report from last year claimed that 1.8 billion credentials were stolen in the first half of 2025, an 800% increase compared to the previous six months.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
Predecessors of LeakBase taken out by law enforcement included RaidForums in 2022, and BreachForums a year later.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
In 2025, the FBI and French police were forced to take action again to shutter another BreachForums domain.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
-
A global operation led by Microsoft and Europol recently resulted in disruption to the notorious Tycoon2FA phishing-as-a-service site.
First reported: 05.03.2026 11:451 source, 1 articleShow sources
- Europol Operation Seizes LeakBase Data Breach Site — www.infosecurity-magazine.com — 05.03.2026 11:45
Similar Happenings
Global Law Enforcement Disrupts 'The Com' Cybercrime Collective
A coordinated international operation, Project Compass, has arrested 30 members of 'The Com,' a cybercrime group linked to ransomware attacks, extortion, violent activities, and the production of child sexual exploitation material (CSAM). The group, primarily composed of young individuals, has targeted high-profile entities and engaged in phishing, vishing, and SIM swapping. Project Compass, led by Europol's European Counter Terrorism Centre, involves multiple countries and aims to disrupt the group's operations and safeguard victims. The Com has been connected to Russian cybercriminal gangs and has expanded its activities to include physical violence, extremist links, and the exploitation of minors. The group operates with a decentralized structure, making it particularly difficult to disrupt. Europol splits The Com into three distinct groups of activity: cyber activity, offline activity, and extortion/sextortion activity.
AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks
A Russian-speaking, financially motivated hacker used generative AI services to breach over 600 FortiGate firewalls across 55 countries in five weeks. The campaign, which occurred between January 11 and February 18, 2026, targeted exposed management interfaces and weak credentials lacking MFA protection. The attacker used AI to automate access to other devices on breached networks, extracting sensitive configuration data and conducting reconnaissance. The attacker successfully compromised multiple organizations' Active Directory environments, extracted complete credential databases, and targeted backup infrastructure, likely in a lead-up to ransomware deployment. The threat actor used the CyberStrikeAI AI-powered security testing platform, which integrates over 100 security tools and allows for end-to-end automation of attacks. The developer of CyberStrikeAI, known as "Ed1s0nZ," has links to Chinese government-affiliated cyber operations and has worked on additional AI-assisted security tools. Team Cymru detected 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, primarily hosted in China, Singapore, and Hong Kong. Additional servers related to CyberStrikeAI have been detected in the U.S., Japan, and Switzerland. The developer has interacted with organizations supporting potentially Chinese government state-sponsored cyber operations, including Knownsec 404, a Chinese security vendor with ties to the Chinese Ministry of State Security (MSS). Ed1s0nZ has removed references to a CNNVD Level 2 Contribution Award from their GitHub profile.
JokerOTP MFA phishing-as-a-service dismantled, third suspect arrested
The Netherlands Police arrested a 21-year-old man from Dordrecht for selling access to the JokerOTP phishing automation tool, which intercepts one-time passwords (OTPs) to hijack accounts. The arrest is part of a three-year investigation that led to dismantling the JokerOTP phishing-as-a-service (PhaaS) operation in April 2025. The service caused at least $10 million in financial losses across 28,000 attacks in 13 countries. The seller advertised access via Telegram, allowing cybercriminals to automate calls to victims and capture sensitive data. The tool targeted users of PayPal, Venmo, Coinbase, Amazon, and Apple. The investigation is ongoing, with dozens of buyers identified for prosecution.
Black Basta Leader Identified and Added to Interpol's Red Notice List
Law enforcement in Ukraine and Germany have identified Oleg Evgenievich Nefedov, a 35-year-old Russian national, as the leader of the Black Basta ransomware gang. Nefedov, known by multiple aliases, has been added to Europol's 'Most Wanted' and Interpol's 'Red Notice' lists. Ukrainian police, in collaboration with German authorities, identified two additional individuals involved in initial network breaches and privilege escalation for ransomware attacks. These individuals were found to be 'hash crackers', specializing in extracting passwords from account databases. Raids in Ukraine seized digital storage devices and cryptocurrency assets. Black Basta has targeted over 500 companies globally and is estimated to have earned hundreds of millions of dollars in cryptocurrency. Nefedov is believed to have ties to Russian intelligence agencies and was arrested in Armenia but secured his freedom. The group's internal chat logs leaked, revealing its structure and key members, and its data leak site was taken down in February 2025. Former affiliates may have migrated to the CACTUS ransomware operation.
US Seizes E-Note Crypto Exchange for Ransomware Laundering
The U.S. Department of Justice, led by the FBI and collaborating with international partners, has seized the E-Note cryptocurrency exchange for allegedly laundering over $70 million in ransomware and account takeover proceeds. The operation involved confiscating domains, servers, and customer databases, with an indictment unsealed against the Russian national Mykhalio Petrovich Chudnovets, believed to be the operator of E-Note. Chudnovets targeted US healthcare and critical infrastructure sectors through his money laundering services, which he began offering in 2010. This action may lead to further identification of cybercriminals involved in the laundering scheme.