This article is from the source 'rtcom' and was first published or seen on . The next check for changes will be

You can find the current article at its original source at https://www.rt.com/news/585490-europol-ragnar-locker-ransomware/

The article has changed 2 times. There is an RSS feed of changes available.

Version 0 Version 1
Europol busts major ransomware gang Europol busts major ransomware gang
(32 minutes later)
The Ragnar Locker ransomware group has been brought down in an international operation and its suspected leader arrested The Ragnar Locker group has been brought down in an international operation and its suspected leader arrested
Europol has announced the dismantling of Ragnar Locker, a multinational c group described as “one of the most dangerous ransomware operations” of recent years. Europol has announced the dismantling of Ragnar Locker, a multinational crime group described as “one of the most dangerous ransomware operations” of recent years.
In a statement made on Friday, Europol said the group was taken down during a major operation by police and judicial authorities from eleven countries. In a statement made on Friday, Europol said the group was taken down during a major operation by police and judicial authorities from eleven countries. 
“This international sweep follows a complex investigation led by the French National Gendarmerie, together with law enforcement authorities from the Czechia, Germany, Italy, Japan, Latvia, the Netherlands, Spain, Sweden, Ukraine and the United States of America,” Europol said in a statement, adding that the first round of arrests under the case were made in Ukraine in late 2021. “This international sweep follows a complex investigation led by the French National Gendarmerie, together with law enforcement authorities from the Czechia, Germany, Italy, Japan, Latvia, the Netherlands, Spain, Sweden, Ukraine and the United States of America,” Europol said in a statement, adding that the first round of arrests under the case were made in Ukraine in late 2021. 
The final stage of the months-long operation was carried out over October 16-20 with multiple searches conducted in Latvia, Spain, and the Czech Republic. The suspected leader of the group was arrested in France on October 16 and his home in the Czech Republic searched at the same time. Five other suspects were brought in for questioning in Spain and Latvia shortly thereafter, Europol revealed. The final stage of the months-long operation was carried out over October 16-20 with multiple searches conducted in Latvia, Spain, and the Czech Republic. The suspected leader of the group was arrested in France on October 16 and his home in the Czech Republic searched at the same time. Five other suspects were brought in for questioning in Spain and Latvia shortly thereafter, Europol revealed. 
Law enforcement seized servers and other infrastructure used by the group in the Netherlands, Germany, and Sweden, taking offline Ragnar Locker’s leak site, which is located on the dark web. Law enforcement seized servers and other infrastructure used by the group in the Netherlands, Germany, and Sweden, taking offline Ragnar Locker’s leak site, which is located on the dark web. 
The group had been active since December 2019, preying on remote access and administration software to attack various companies and institutions and holding them ransom. The group explicitly warned its victims not to contact any authorities, leaking stolen data on the dark web should they approach law enforcement instead of paying the ransom. Other part of the extortion tactic by the group involved demanding money from its victims for decrypting tools.The group had been active since December 2019, preying on remote access and administration software to attack various companies and institutions and holding them ransom. The group explicitly warned its victims not to contact any authorities, leaking stolen data on the dark web should they approach law enforcement instead of paying the ransom. Other part of the extortion tactic by the group involved demanding money from its victims for decrypting tools.
The most notable attacks carried out by the group involved hitting TAP Air Portugal, the country’s flagship carrier in late 2022, as well as a major Israeli clinic, the Mayanei Hayeshua hospital, in September of this year.The most notable attacks carried out by the group involved hitting TAP Air Portugal, the country’s flagship carrier in late 2022, as well as a major Israeli clinic, the Mayanei Hayeshua hospital, in September of this year.