Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control
  • The Hacker News

RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control

[email protected] The Hacker News Published: April 30, 2025 | Updated: April 30, 2025 5 min read
0 views
RansomHub Went Dark

Cybersecurity researchers have revealed that RansomHub‘s online infrastructure has “inexplicably” gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomware-as-a-service (RaaS) operation.

Singaporean cybersecurity company Group-IB said that this may have caused affiliates to migrate to Qilin, given that “disclosures on its DLS [data leak site] have doubled since February.”

RansomHub, which first emerged in February 2024, is estimated to have stolen data from over 200 victims. It replaced two high-profile RaaS groups, LockBit and BlackCat, to become a frontrunner, courting their affiliates, including Scattered Spider and Evil Corp, with lucrative payment splits.

“Following a possible acquisition of the web application and ransomware source code of Knight (formerly Cyclops), RansomHub quickly rose in the ransomware scene, thanks to the dynamic features of its multi-platform encryptor and an aggressive, affiliate-friendly model offering substantial financial incentives,” Group-IB said in a report.

RansomHub’s ransomware is designed to work on Windows, Linux, FreeBSD, and ESXi as well as on x86, x64, and ARM architectures, while avoiding attacking companies located in the Commonwealth of Independent States (CIS), Cuba, North Korea, and China. It can also encrypt local and remote file systems via SMB and SFTP.

The affiliate panel, which is used to configure the ransomware via a web interface, features a dedicated “Members” section where members of the affiliate group are given the option to create their own accounts on the device.

Cybersecurity

Affiliates have also been provided with a “Killer” module as of at least June 2024 to terminate and bypass security software using known vulnerable drivers (BYOVD). However, the tool has since been discontinued owing to high detection rates.

Per eSentire and Trend Micro, cyber-attacks have also been observed leveraging a JavaScript malware known as SocGholish (aka FakeUpdates) via compromised WordPress sites to deploy a Python-based backdoor connected to RansomHub affiliates.

“On November 25, the group’s operators released a new note on their affiliate panel announcing that any attack against any government institution is strictly forbidden,” the company said. “All affiliates were therefore invited to refrain from such acts because of the high risk and unprofitable ‘return of investment.'”

GuidePoint Security, which has also observed the downtime of RansomHub infrastructure, said the chain of events has led to an “affiliate unrest,” with rival RaaS group DragonForce claiming on the RAMP forum that RansomHub “decided to move to our infrastructure” under a new “DragonForce Ransomware Cartel.”

It’s worth noting that another RaaS actor called BlackLock is also assessed to have started collaborating with DragonForce after the latter defaced its data leak site in late March 2025.

“These discussions on the RAMP forums highlight the uncertain environment that RansomHub affiliates appear to be in at the moment, seemingly unaware of the group’s status and their own status amidst a potential ‘Takeover,'” GuidePoint Security said.

“It remains to be seen whether this instability will spell the beginning of the end for RansomHub, though we cannot help but note that the group that rose to prominence by promising stability and security for affiliates may now have failed or betrayed affiliates on both counts.”

Secureworks Counter Threat Unit (CTU), which has also tracked DragonForce’s rebrand as a “cartel,” said the effort is part of a new business model designed to attract affiliates and increase profits by allowing affiliates to create their own “brands.”

This is different from a traditional RaaS scheme where the core developers set up the dark web infrastructure and recruit affiliates from the cybercrime underground, who then conduct the attacks after procuring access to target networks from an initial access broker (IAB) in exchange for 70% of the ransom payment.

“In this model, DragonForce provides its infrastructure and tools but doesn’t require affiliates to deploy its ransomware,” the Sophos-owned company said. “Advertised features include administration and client panels, encryption and ransom negotiation tools, a file storage system, a TOR-based leak site and .onion domain, and support services.”

Another ransomware group to embrace novel tactics is Anubis, which sprang forth in February 2025 and uses a “data ransom” extortion-only option to exert pressure on victims by threatening to publish an “investigative article” containing an analysis of the stolen data and inform regulatory or compliance authorities of the incident.

“As the ransomware ecosystem continues to flex and adapt we are seeing wider experimentation with different operating models,” Rafe Pilling, Director of Threat Intelligence at Secureworks CTU said. “LockBit had mastered the affiliate scheme but in the wake of the enforcement action against them it’s not surprising to see new schemes and methods being tried and tested.”

The development coincides with the emergence of a new ransomware family called ELENOR-corp, a variant of the Mimic ransomware, that’s actively targeting healthcare organizations after harvesting credentials using a Python executable capable of stealing clipboard content.

“The ELENOR-corp variant of Mimic ransomware exhibits enhancements compared to earlier versions, employing sophisticated anti-forensic measures, process tampering, and encryption strategies,” Morphisec researcher Michael Gorelik said.

“This analysis highlights the evolving sophistication of ransomware attacks, emphasizing the need for proactive defenses, swift incident response, and robust recovery strategies in high-risk industries like healthcare.”

Cybersecurity

Some of the other notable ransomware campaigns observed in recent months are as follows –

  • CrazyHunter, which has targeted Taiwanese healthcare, education, and industrial sectors and uses BYOVD techniques to circumvent security measures via an open-source tool named ZammoCide
  • Elysium, a new variant of the Ghost (aka Cring) ransomware family that terminates a hard-coded list of services, disables system backups, deletes shadow copies, and modifies the boot status policy to make system recovery harder
  • FOG, which has abused the name of the U.S. Department of Government Efficiency (DOGE), and individuals connected to the government initiative in email and phishing attacks to distribute malware-laced ZIP files that deliver the ransomware
  • Hellcat, which has exploited zero-day vulnerabilities, such as those in Atlassian Jira, to obtain initial access
  • Hunters International, which has rebranded and launched an extortion-only operation known as World Leaks by making use of a bespoke data exfiltration program
  • Interlock, which has leveraged the infamous ClickFix strategy to initiate a multi-stage attack chain that deploys the ransomware payload, alongside a backdoor called Interlock RAT and stealers such as Lumma and BerserkStealer
  • Qilin, which has employed a phishing email masquerading as ScreenConnect authentication alerts to breach a Managed Service Provider (MSP) using an AitM phishing kit and launch ransomware attacks on its customers (attributed to an affiliate named STAC4365)

These campaigns serve to highlight the ever-evolving nature of ransomware and demonstrate the threat actors’ ability to innovate in the face of law enforcement disruptions and leaks.

Indeed, a new analysis of the 200,000 internal Black Basta chat messages by the Forum of Incident Response and Security Teams (FIRST) has revealed how the ransomware group conducts its operations, focusing on advanced social engineering techniques and exploiting VPN vulnerabilities.

“A member known as ‘Nur’ is tasked with identifying key targets within organizations they aim to attack,” FIRST said. “Once they locate a person of influence (such as a manager or HR personnel), they initiate contact via phone call.”

Found this article interesting? Follow us on Twitter ï‚™ and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code
Next: Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

Author's Other Posts

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Related Stories

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
nist-cve.jpg
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

[email protected] The Hacker News April 17, 2026 0 1
europol.jpg
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

[email protected] The Hacker News April 17, 2026 0 0

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.