Home News Global Police Operation Leads to Arrest of 8Base Ransomware Group Members
News

Global Police Operation Leads to Arrest of 8Base Ransomware Group Members

In a coordinated effort by law enforcement agencies from 14 countries, four Russian nationals have been arrested for their alleged involvement in the 8Base ransomware group. The suspects were apprehended in Phuket, Thailand, facing multiple charges that could lead to decades in prison. In addition, 27 servers linked to the criminal network were dismantled.

The 8Base gang has been utilizing a variant of Phobos ransomware to extort substantial sums from victims across Europe, the United States, and beyond. First identified in December 2018, Phobos ransomware has been deployed in numerous large-scale attacks against various businesses and organizations worldwide.

According to authorities, 8Base is believed to have targeted over 1,000 public and private entities, amassing more than $16 million in ransom payments. Europol noted that, unlike more high-profile ransomware groups that focus on large corporations, Phobos primarily targets small to medium-sized businesses, which often lack the necessary cybersecurity protections.

The group’s Ransomware as a Service (RaaS) model has made it accessible to a wide range of criminal actors, from individuals to organized crime syndicates like 8Base. This group has developed its own version of the ransomware, customizing its encryption and delivery methods to maximize damage.

8Base has also employed aggressive double extortion tactics, encrypting victims’ data while threatening to release stolen information if ransoms are not paid. This strategy has drawn significant attention from international law enforcement. In 2023, a key affiliate was arrested in Italy, and last summer, an administrator was detained in South Korea and extradited to the U.S.

Two of the arrested individuals, Roman Berezhnoy, 33, and Egor Nikolaevich Glebov, 39, have been charged in the United States. They are accused of executing ransomware attacks between May 2019 and at least October 2024, with victims reportedly including a children’s hospital, healthcare providers, and educational institutions.

The U.S. Department of Justice stated that after a successful Phobos attack, criminal affiliates would pay fees to Phobos administrators for decryption keys to regain access to their data. Each ransomware deployment was tagged with a unique alphanumeric string, facilitating the connection to the respective decryption key, which affiliates were required to pay into a designated cryptocurrency wallet.

The UK’s National Crime Agency (NCA) highlighted the significant impact of 8Base’s activities on businesses in the UK and noted that the investigation has helped prevent several organizations from becoming victims of encryption.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

News

WormGPT-4 and KawaiiGPT Fuel Rise of AI-Driven Cybercrime

Cybercriminals are increasingly turning to “dark” large language models (LLMs) such as...

News

Brazilian Crypto Holders Targeted via WhatsApp by Malware Worm

Cybercriminals are targeting crypto holders in Brazil using a malicious campaign on...

News

Radzarat Trojan Masquerades as PDF Converter on Android

A new Android Trojan called Radzarat is deceiving users by posing as...

News

Sophisticated macOS Infostealer Hits Newer Apple Silicon Devices

Researchers have discovered a new, highly-sophisticated macOS malware called DigitStealer that masquerades...