International law enforcement officials announced Friday that they had shut down important infrastructure and apprehended a hacker suspected of being linked to a ransomware group that had been targeting essential infrastructure.
The RagnarLocker dark web site was replaced Thursday with a notification stating that it had been “seized as part of a coordinated international law enforcement action.”
According to a news release issued by Europol on Friday, the website confiscation was part of a bigger, coordinated campaign that included the arrest of a suspected RagnarLocker developer on Monday, the questioning of five other suspected members throughout the week, and the seizure of the group’s network infrastructure this week.
READ MORE: Hackers Leave Their Imprint On The Israel-Hamas Conflict
According to Europol, law enforcement authorities from Europe, the United States, and Japan were involved in the operation.
The confiscation of the website was initially reported by TechCrunch and BleepingComputer.
Why it is significant: The law enforcement operation is a significant setback for one of the most dangerous ransomware organizations.
READ MORE: Hackers Steal $200 Million In Cryptocurrency From Mixin, A Hong Kong-Based Firm
The broad picture: Law enforcement in the United States and its international partners have been working harder to bring down ransomware gangs by targeting their online infrastructure and financing sources.
Many ransomware culprits reside in so-called “safe harbor” nations, where they are unlikely to be extradited even if charged.
As a result, law enforcement is increasingly relying on infrastructure shutdowns, website seizures, and financial sanctions to disrupt the ransomware ecosystem.
The mystery: RagnarLocker is well-known for targeting hospital institutions, energy industries, and other key infrastructure organizations.
READ MORE: A New Smartphone Flaw May Allow Hackers To Track User Position
The gang claimed responsibility for a hack on Israel’s Mayanei Hayeshua Medical Center last month. Which resulted in patient care being diverted to other facilities and significant data disclosures.
According to the FBI, as of January 2022 (the most recent government data available), the group had targeted at least 52 organizations across the United States’ critical infrastructure.
Yes, but cybercriminals are known to discover ways to rebuild after being taken down by law enforcement.
Download The Radiant App To Start Watching!
Web: Watch Now
LGTV™: Download
ROKU™: Download
XBox™: Download
Samsung TV™: Download
Amazon Fire TV™: Download
Android TV™: Download