Babuk-Locker

Compare
Parsing: enabled Known RaaS

View crypto

Description

Babuk‑Locker emerged in early 2021 as a Ransomware‑as‑a‑Service (RaaS) gang targeting high‑value “big game” enterprises across sectors like healthcare, telecommunications, finance, education, and government. It initially deployed crypto-ransomware—encrypting files using ChaCha8 encryption with keys secured via elliptic‑curve Diffie‑Hellman—and later added a double‑extortion model involving data theft and leak site threats. Notable incidents include attacks on the Washington, D.C. Metropolitan Police Department and other organizations. In mid‑2021, Babuk’s source code was leaked, prompting both a fragmentation of its core operations and emergence of variants like Babuk Tortilla and Babuk V2. Affiliates exploited vulnerabilities in ESXi hypervisors to deliver destructive variants, and law enforcement actions eventually disrupted key operators.

External Analysis3
External Analysis
https://www.bleepingcomputer.com/news/security/leaked-babuk-locker-ransomware-builder-used-in-new-attacks
https://www.bleepingcomputer.com/news/security/babuk-ransomwares-full-source-code-leaked-on-hacker-forum
https://blog.cyberint.com/babuk-locker
Affiliates1
Affiliates
Wazawaka
Urls1
Url
Status
Screen
Uptime 30d
Health
http://nq4zyac4ukl4tykmidbzgdlvaboqeqsemkp4t35bzvjeve6zm2lqcjid.onion/#section-3 Down Screen
Activity (interactive) 6
Activity charts
Posts6
Date Title Description Screen
The Babuk team shares the position stated by the most famous hacktivist group. Screen
4murs.com Screen
Arabian Computer Supplies co. Screen
spsr-law.com Screen
E.A. Gibson Shipbrokers Screen
BridgeMill Athletic Club Screen
Note