The U.S. Department of Justice (DOJ) took down multiple servers and domains belonging to the BlackSuit ransomware group, U.S. officials announced on Monday. Over $1 Million Seized In BlackSuit Bust According to an August 11 press release from the DOJ , U.S. officials from four different agencies partnered with international law enforcement from the United Kingdom, Germany, Ireland, France, Canada, Ukraine, and Lithuania to take down four domains and nine servers late last month. The Justice Department today announced coordinated actions against the BlackSuit (Royal) Ransomware group which included the takedown of four servers and nine domains on July 24. These actions include the unsealing of a warrant for the seizure of virtual currency valued at… pic.twitter.com/Inz6naZZoL — U.S. Attorney DC (@USAO_DC) August 11, 2025 Officials involved in the operation say a recently unsealed warrant shows that authorities seized over $1 million worth of digital assets tied to the malware scheme on June 21. “When it comes to protecting U.S. businesses, critical infrastructure, and other victims from ransomware and other cyberthreat actors, we will pull no punches,” said U.S. Attorney Erik S. Siebert for the Eastern District of Virginia. The report states that the ransomware group is known to target “Critical Infrastructure sectors” including, but not limited to, Critical Manufacturing, Government Facilities, Healthcare and Public Health, and Commercial Facilities. “The BlackSuit ransomware gang’s persistent targeting of U.S. critical infrastructure represents a serious threat to U.S. public safety,” said Assistant Attorney General for National Security John A. Eisenberg. “The National Security Division is proud to be part of an ongoing team of government agencies and partners working to protect our Nation from threats to our critical infrastructure,” he added. North Korea’s Crypto Connection U.S. officials have long targeted malware schemes tethered to the cryptocurrency industry, particularly when it comes to the North Korean state espionage collective, the Lazarus Group . A report from a U.N. panel of experts published last year revealed that an estimated 40% of North Korea’s weapons of mass destruction (WMD) were funded through “illicit cyber means.” As of 2024, the Lazarus Group had stolen more than $3 billion worth of digital assets globally.The U.S. Department of Justice (DOJ) took down multiple servers and domains belonging to the BlackSuit ransomware group, U.S. officials announced on Monday. Over $1 Million Seized In BlackSuit Bust According to an August 11 press release from the DOJ , U.S. officials from four different agencies partnered with international law enforcement from the United Kingdom, Germany, Ireland, France, Canada, Ukraine, and Lithuania to take down four domains and nine servers late last month. The Justice Department today announced coordinated actions against the BlackSuit (Royal) Ransomware group which included the takedown of four servers and nine domains on July 24. These actions include the unsealing of a warrant for the seizure of virtual currency valued at… pic.twitter.com/Inz6naZZoL — U.S. Attorney DC (@USAO_DC) August 11, 2025 Officials involved in the operation say a recently unsealed warrant shows that authorities seized over $1 million worth of digital assets tied to the malware scheme on June 21. “When it comes to protecting U.S. businesses, critical infrastructure, and other victims from ransomware and other cyberthreat actors, we will pull no punches,” said U.S. Attorney Erik S. Siebert for the Eastern District of Virginia. The report states that the ransomware group is known to target “Critical Infrastructure sectors” including, but not limited to, Critical Manufacturing, Government Facilities, Healthcare and Public Health, and Commercial Facilities. “The BlackSuit ransomware gang’s persistent targeting of U.S. critical infrastructure represents a serious threat to U.S. public safety,” said Assistant Attorney General for National Security John A. Eisenberg. “The National Security Division is proud to be part of an ongoing team of government agencies and partners working to protect our Nation from threats to our critical infrastructure,” he added. North Korea’s Crypto Connection U.S. officials have long targeted malware schemes tethered to the cryptocurrency industry, particularly when it comes to the North Korean state espionage collective, the Lazarus Group . A report from a U.N. panel of experts published last year revealed that an estimated 40% of North Korea’s weapons of mass destruction (WMD) were funded through “illicit cyber means.” As of 2024, the Lazarus Group had stolen more than $3 billion worth of digital assets globally.

U.S. Officials Take Down BlackSuit Malware Collective In Major Cyber Crackdown

2025/08/14 04:39
2분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

The U.S. Department of Justice (DOJ) took down multiple servers and domains belonging to the BlackSuit ransomware group, U.S. officials announced on Monday.

Over $1 Million Seized In BlackSuit Bust

According to an August 11 press release from the DOJ, U.S. officials from four different agencies partnered with international law enforcement from the United Kingdom, Germany, Ireland, France, Canada, Ukraine, and Lithuania to take down four domains and nine servers late last month.

Officials involved in the operation say a recently unsealed warrant shows that authorities seized over $1 million worth of digital assets tied to the malware scheme on June 21.

“When it comes to protecting U.S. businesses, critical infrastructure, and other victims from ransomware and other cyberthreat actors, we will pull no punches,” said U.S. Attorney Erik S. Siebert for the Eastern District of Virginia.

The report states that the ransomware group is known to target “Critical Infrastructure sectors” including, but not limited to, Critical Manufacturing, Government Facilities, Healthcare and Public Health, and Commercial Facilities.

“The BlackSuit ransomware gang’s persistent targeting of U.S. critical infrastructure represents a serious threat to U.S. public safety,” said Assistant Attorney General for National Security John A. Eisenberg.

“The National Security Division is proud to be part of an ongoing team of government agencies and partners working to protect our Nation from threats to our critical infrastructure,” he added.

North Korea’s Crypto Connection

U.S. officials have long targeted malware schemes tethered to the cryptocurrency industry, particularly when it comes to the North Korean state espionage collective, the Lazarus Group.

A report from a U.N. panel of experts published last year revealed that an estimated 40% of North Korea’s weapons of mass destruction (WMD) were funded through “illicit cyber means.”

As of 2024, the Lazarus Group had stolen more than $3 billion worth of digital assets globally.

시장 기회
Moonveil 로고
Moonveil 가격(MORE)
$0.00003686
$0.00003686$0.00003686
+4.56%
USD
Moonveil (MORE) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!