FBI disrupts the Dispossessor ransomware operation, seizes servers

Teilen:

The FBI announced on Monday that it seized the servers and websites of the Radar/Dispossessor ransomware operation following a joint international investigation.

The joint operation was carried out in collaboration with the U.K.’s National Crime Agency, the Bamberg Public Prosecutor’s Office, and the Bavarian State Criminal Police Office (BLKA).

Law enforcement seized three U.S. servers, three U.K. servers, 18 German servers, eight U.S.-based domains, and one German-based domain, including radar[.]tld, dispossessor[.]com, dispossessor-cloud[.]com, cybershare[.]app, readteamcr[.]com, redhotcypher[.]com, cybernewsint[.]com (fake news site), and cybertube[.]video (fake video site).

Since August 2023, Dispossessor—led by a threat actor known as Brain—has targeted small to mid-sized businesses in various sectors worldwide, claiming attacks against dozens of companies (the FBI identified 43 victims) from the U.S., Argentina, Australia, Belgium, Brazil, Honduras, India, Canada, Croatia, Peru, Poland, the United Kingdom, the United Arab Emirates, and Germany.

The FBI says the ransomware gang breaches networks through vulnerabilities, weak passwords, and the lack of multi-factor authentication configured on accounts. After gaining access to the victim’s network, they steal data and deploy the ransomware to encrypt the company’s devices.

“Once the criminals gained access to the systems, they obtained administrator rights and easily gained access to the files. The actual ransomware was then used for encryption. As a result, the companies could no longer access their own data,” the FBI said in a press release shared with BleepingComputer.

“Once the company was attacked, if they did not contact the criminal actor, the group would then proactively contact others in the victim company either through email or phone call. The emails also included links to video platforms on which the previously stolen files had been presented.”

The FBI also asked past victims or those targeted to share information on the Dispossessor gang by contacting the Internet Crime Complaint Center at ic3.gov or 1-800-CALL FBI.

When the cybercrime group initially launched, it acted as an extortion group, reposting old data stolen during LockBit ransomware attacks, from which they claimed to be affiliates. Dispossessor has also been reposting leaks from other ransomware operations and attempting to sell them on various breach markets and hacking forums like BreachForums and XSS.

“Dispossessor initially announced the renewed availability of the data from some 330 LockBit victims. This was claimed to be reposted data from previously available LockBit victims, now hosted on Dispossessor’s network and thus not subject to LockBit’s availability restrictions,” SentinelOne said in an April report.

“Dispossessor appears to be reposting data previously associated with other operations with examples ranging from Cl0p, Hunters International, and 8base. We are aware of at least a dozen victims listed on Dispossessor that have also been previously listed by other groups.”

Starting in June 2024, the threat actors began utilizing the leaked LockBit 3.0 encryptor [VirusTotal] for use in their own encryption attacks, significantly escalating the scope of their attacks.

Over the past year, law enforcement operations have targeted many other cybercrime activities, including cryptocurrency scams, malware development, phishing attacks, credential theft, and ransomware operations.

For instance, they have used hack-back tactics to infiltrate, disrupt, and dismantle ALPHV/Blackcat ransomware, a ransomware group deploying LockerGoga, MegaCortex, HIVE, and Dharma, the Ragnar Locker ransomware operation, and Hive ransomware.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:46 am, Juli 6, 2025
Wetter-Symbol 19°C
L: 19° | H: 21°
overcast clouds
Luftfeuchtigkeit: 75 %
Druck: 1005 mb
Wind: 9 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:51 am
Sonnenuntergang: 9:18 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
19° | 21°°C 1 mm 100% 9 mph 77 % 1006 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
13° | 20°°C 1 mm 100% 13 mph 95 % 1015 mb 0 mm/h
Di. Juli 08 10:00 pm
Wetter-Symbol
13° | 24°°C 0 mm 0% 12 mph 75 % 1020 mb 0 mm/h
Mi. Juli 09 10:00 pm
Wetter-Symbol
15° | 26°°C 0 mm 0% 8 mph 77 % 1023 mb 0 mm/h
Do. Juli 10 10:00 pm
Wetter-Symbol
19° | 30°°C 0 mm 0% 7 mph 66 % 1024 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
19° | 19°°C 0.21 mm 21% 5 mph 76 % 1005 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
19° | 20°°C 1 mm 100% 8 mph 77 % 1005 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
21° | 22°°C 1 mm 100% 9 mph 72 % 1004 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
22° | 22°°C 1 mm 100% 9 mph 77 % 1005 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
18° | 18°°C 0.45 mm 45% 8 mph 71 % 1006 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
17° | 17°°C 0.14 mm 14% 7 mph 85 % 1007 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
14° | 14°°C 1 mm 100% 6 mph 95 % 1007 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
13° | 13°°C 1 mm 100% 9 mph 93 % 1009 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,694.53
-0.01%
Ethereum(ETH)
€2,133.35
-0.18%
Fesseln(USDT)
€0.85
0.00%
XRP(XRP)
€1.89
0.41%
Solana(SOL)
€125.11
0.05%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.138739
-0.56%
Shiba Inu(SHIB)
€0.000010
0.30%
Pepe(PEPE)
€0.000008
-1.34%
Nach oben scrollen