Cybersecurity Showdown: BlackLock Ransomware Meets Its Match!

Resecurity discovered an LFI flaw in BlackLock Ransomware’s leak site, revealing clearnet IPs and server details. By exploiting this vulnerability, they disrupted cybercriminal activity and protected potential victims. BlackLock, a major ransomware strain, went offline, and DragonForce may now inherit its operations. BlackLock Ransomware proves even cybercriminals can have technical difficulties.

Pro Dashboard

Hot Take:

Looks like BlackLock Ransomware just got its cloak of invisibility yanked away by Resecurity! With a slip-up in their disguise, these cyber Houdinis might just be the ones needing a magician’s hat to disappear now. Forget about ransomware, they need to focus on securing their own secrets first!

Key Points:

  • Resecurity exploited an LFI flaw in BlackLock Ransomware’s Data Leak Site (DLS).
  • The flaw exposed clearnet IPs and server details behind TOR services.
  • BlackLock is a rapidly growing ransomware strain, rebranded from El Dorado.
  • Resecurity identified 8 MEGA accounts used by the group for data management.
  • With BlackLock offline, DragonForce might take over their operations.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?