The Embargo ransomware group has stolen $34.2 million since emerging in April 2024, targeting victims across the healthcare, business services, and manufacturing.The Embargo ransomware group has stolen $34.2 million since emerging in April 2024, targeting victims across the healthcare, business services, and manufacturing.

Embargo ransomware group nets $34.2m within a year: TRM Labs

2025/08/11 03:00
2분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

The Embargo ransomware group has stolen $34.2 million since emerging in April 2024, targeting victims across the healthcare, business services, and manufacturing sectors, according to TRM Labs research.

Most victims are located in the U.S., with ransom demands reaching up to $1.3 million per attack.

The cybercrime group has hit major targets, including American Associated Pharmacies, Memorial Hospital and Manor in Georgia, and Weiser Memorial Hospital in Idaho.

TRM Labs identified approximately $18.8 million in victim funds that remain dormant in unattributed wallets.

BlackCat connection suspected

According to TRM Labs, Embargo may be a rebranded version of the defunct BlackCat (ALPHV) ransomware group, based on technical similarities and shared infrastructure.

Both groups use the Rust programming language and maintain nearly identical data leak site designs and functionality.

On-chain analysis revealed that historical BlackCat-linked addresses funneled cryptocurrency to wallet clusters associated with Embargo victims.

The connection suggests that Embargo’s operators may have inherited the BlackCat operation or evolved from it following its apparent exit scam in 2024.

Embargo operates under a ransomware-as-a-service model, providing tools to affiliates while retaining control over core operations and payment negotiations. This structure enables rapid scaling across multiple sectors and geographic regions.

Embargo ransomware’s use of sophisticated laundering methods

The organization uses sanctioned platforms such as Cryptex.net, high-risk exchanges, and intermediary wallets to launder stolen cryptocurrency.

Between May and August 2024, TRM Labs monitored approximately $13.5 million in deposits made through various virtual asset service providers, including more than $1 million routed through Cryptex.net.

Embargo avoids heavy reliance on cryptocurrency mixers, instead layering transactions across multiple addresses before depositing funds directly into exchanges.

The group was observed using the Wasabi mixer in limited instances, with only two identified deposits.

The ransomware operators deliberately park funds at various stages of the laundering process, likely to disrupt tracing patterns or wait for favorable conditions such as reduced media attention or lower network fees.

Embargo specifically targets healthcare organizations to maximize leverage through operational disruption.

Healthcare attacks can directly impact patient care, with potentially life-threatening consequences, and create pressure for quick ransom payments.

The group employs double extortion tactics—encrypting files while exfiltrating sensitive data. Victims face threats of data leaks or dark web sales if they refuse payment, compounding financial damage with reputational and regulatory consequences.

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!