DOJ Seizes Servers and $1M Bitcoin from BlackSuit Ransomware Gang
U.S. authorities, working with international partners, seized four servers, nine domains and about $1 million in bitcoin linked to a Russian gang behind BlackSuit and Royal ransomware. The group has hit 450+ U.S. victims across critical sectors, demanded over $500M, and collected roughly $370M since 2022. The takedown shows cross-border law enforcement and crypto tracing can disrupt prolific ransomware networks.
DOJ seizes servers and $1M in bitcoin tied to BlackSuit and Royal
The U.S. Department of Justice announced a coordinated international operation that seized four servers, nine domains and about $1 million in bitcoin linked to a Russian cybercriminal group behind the BlackSuit and Royal ransomware families.
A coalition that included law enforcement from the U.S., Canada, Germany, Ireland, France, and the U.K. carried out the takedown on July 24. The recovered bitcoin came from an exchange account that had been frozen earlier in January of last year.
BlackSuit and Royal are separate ransomware variants believed to be operated by the same Russian gang. U.S. agencies warn the group has targeted critical infrastructure and public safety organizations, demanding massive ransoms and causing wide disruption.
CISA previously said the actors have demanded more than $500 million in total, with single demands as high as $60 million. Homeland Security Investigations says the group compromised over 450 U.S. victims across healthcare, education, public safety, energy and government sectors and earned roughly $370 million since 2022.
Assistant Attorney General John A. Eisenberg noted the gang's persistent targeting of U.S. critical infrastructure poses a serious public-safety threat. The seizure is meant to disrupt operations and deter future attacks by removing infrastructure and freezing funds.
What this operation shows is twofold: international cooperation can identify and disrupt criminal infrastructure, and cryptocurrency tracing — combined with traditional investigative techniques — can recover at least a portion of illicit proceeds.
But seizures alone won’t end ransomware. These groups adapt quickly, use new hosts and money-laundering chains, and keep exploiting gaps in defenses. Organizations in critical sectors must assume they are targets and invest in resilience and response readiness.
Key takeaways for defenders include stronger segmentation, reliable offline backups, rapid incident response playbooks, and improved supply-chain visibility. Public-private information sharing and exercises that simulate ransom negotiations and recovery remain essential.
- What was seized: 4 servers, 9 domains, ~$1 million in bitcoin (from a frozen exchange account).
- Scale and impact: 450+ U.S. victims across healthcare, energy, education, public safety and government.
- Financial footprint: attackers have demanded over $500M and collected about $370M since 2022.
For organizations, the practical lesson is simple: detection and response capabilities must keep pace with adversaries. That means mapping likely attack paths, running regular tabletop and red-team exercises, and ensuring legal and financial controls for cryptocurrency exposure.
At QuarkyByte we combine threat hunting, incident simulation, and asset-prioritization frameworks to translate takedowns like this into improved defensive posture. For example, a hospital network can use prioritized attack-path analysis to harden the systems that ransomware groups habitually exploit, reducing downtime and recovery costs.
The DOJ action is a tactical win and a reminder: cross-border collaboration and crypto tracing matter, but sustained resilience comes from preparation, investment, and continuous adaptation. Ransomware is a business model; disrupting it requires pressure on operations, cash flows, and the vulnerabilities it exploits.
Organizations should treat this as a prompt to reassess their risk posture now — not later. That means validating backups, tightening remote access, enforcing multi-factor authentication, and partnering with analysts who can turn threat intelligence into prioritized action plans.
Keep Reading
View AllCritical Authentication Flaw Exposed in Major Automaker Dealer Portal
A security researcher found API authentication flaws in a leading automaker’s dealer portal, exposing customer data, vehicle tracking, and remote control features.
Stream Borussia Dortmund vs Juventus Free with VPN Tips
Stream Borussia Dortmund vs Juventus live for free on DAZN worldwide and use a VPN like ExpressVPN for secure, high-performance access no matter where you are.
Top 7 Password Managers to Secure Your Apps
Explore seven leading password managers—Bitwarden, Dashlane, 1Password & more—to boost app and data security across devices.
AI Tools Built for Agencies That Move Fast.
QuarkyByte can map your exposure to ransomware tactics like BlackSuit and Royal, simulate attack paths against critical assets, and trace crypto payment flows to reduce payoff risk. Engage our analysts to harden defenses, prioritize remediation, and reduce recovery time with evidence-based playbooks.