A threat actor has leaked the source code for the Babuk ransomware on a Russian-speaking hacking forum.
The Babuk Locker operators halted their operations at the end of April after the attack against the Washington, DC police department. Experts believe that the decision of the group to leave the ransomware practice could be the result of an operational error, it was a bad idea to threaten the US police department due to the information that it manages.
The ransomware gang broke into the Washington, D.C., Metropolitan Police Department, encrypted its files and demanded a $4 million ransom.
At the end of May, the Babuk ransomware operators rebranded their ransomware leak site into Payload.bin and started offering the opportunity to other gangs to use it to leak data stolen from their victims.
Some members of the group gang relaunch the RaaS as Babuk V2.
Now the security research group vx-underground shared a shocking news, a Russian youngster, who is believed to be one of the developers of the Babuk gang, has been diagnosed with terminal cancer and decided to leak the complete Babuk source code for Windows, ESXI, NAS.
Below the image of the original post published on the hacking forum:
Researchers from McAfee Enterprise confirmed that the source code is legitimate.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, RaaS)
[adrotate banner=”5″]
[adrotate banner=”13″]
The UK’s Legal Aid Agency suffered a cyberattack in April and has now confirmed that…
Cybersecurity Observatory of the Unipegaso's malware lab published a detailed analysis of the Sarcoma ransomware.…
Mozilla addressed two critical Firefox vulnerabilities that could be potentially exploited to access sensitive data…
Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…
James Comey is under investigation for a seashell photo showing “8647,” seen by some as…
Pwn2Own Berlin 2025 wrapped up with $383,750 awarded on the final day, pushing the total…
This website uses cookies.