FBI Seizes RAMP Cybercrime Forum
Summary
Hide ▲
Show ▼
The FBI has seized the RAMP cybercrime forum, a platform known for facilitating ransomware operations and other cybercriminal activities. The seizure includes both the forum's Tor site and its clearnet domain, ramp4u[.]io, which now display a seizure notice. The forum was a hub for ransomware gangs to advertise their operations and recruit affiliates. The seizure provides law enforcement with access to a significant amount of data tied to the forum's users, including email addresses, IP addresses, and private messages. This could lead to the identification and potential arrest of threat actors who failed to follow proper operational security (opsec). RAMP was created in 2021 by individuals linked to the now-defunct Babuk ransomware group and was administered by key operators such as Mikhail Matveev (also known as Orange, Wazawaka, and BorisElcin) and Stallman. The forum was a prime hub for various ransomware groups, including LockBit, ALPHV/BlackCat, Conti, DragonForce, Qilin, Nova, Radiant, and RansomHub. Following the seizure, Stallman confirmed there were no plans to rebuild the forum, indicating a significant disruption to the cybercriminal ecosystem.
Timeline
-
29.01.2026 15:05 1 articles · 23h ago
RAMP Administrator Confirms No Plans to Rebuild
Stallman, the administrator of RAMP, issued an official comment regarding the RAMP seizure on January 28, confirming there were no plans to rebuild the forum. This decision is likely linked to concerns about his own freedom and the heightened scrutiny from law enforcement.
Show sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
29.01.2026 15:05 1 articles · 23h ago
Impact of RAMP Takedown on Cybercriminal Ecosystem
The RAMP takedown represents a meaningful disruption to a core piece of criminal infrastructure. It is expected to mostly impact low-tier actors, disrupt distribution and sales for underground sellers, have minimal impact on top-tier groups, and reduce Russian security services' visibility into ransomware processes and sellers.
Show sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
28.01.2026 19:38 2 articles · 1d ago
FBI Seizes RAMP Cybercrime Forum
The FBI has seized the RAMP cybercrime forum, a platform used to advertise a wide range of malware and hacking services, including ransomware operations. The seizure includes both the forum's Tor site and its clearnet domain, ramp4u[.]io, which now display a seizure notice. The forum was launched in July 2021 by a threat actor known as Orange, who was later identified as Russian national Mikhail Matveev. The seizure notice displays a taunting message using RAMP's own slogan and an image of Masha, a Russian cartoon character, winking. The domains linked to RAMP now redirect to seizure notices with FBI and DoJ seals and the nameservers have been updated to ns1.fbi.seized.gov and ns2.fbi.seized.gov.
Show sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
Information Snippets
-
The FBI seized the RAMP cybercrime forum, including its Tor site and clearnet domain.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The seizure notice displays a taunting message using RAMP's own slogan.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The forum was launched in July 2021 by a threat actor known as Orange, who also operated under the aliases Wazawaka and BorisElcin.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Orange was previously the administrator of the Babuk ransomware operation.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The individual behind the Orange and Wazawaka aliases was identified as Russian national Mikhail Matveev.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Matveev was indicted by the U.S. Department of Justice for his involvement in multiple ransomware operations, including Babuk, LockBit, and Hive.
First reported: 28.01.2026 19:382 sources, 2 articlesShow sources
- FBI seizes RAMP cybercrime forum used by ransomware gangs — www.bleepingcomputer.com — 28.01.2026 19:38
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The seizure notice displays a taunting message using RAMP's own slogan and an image of Masha, a Russian cartoon character, winking.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The domains linked to RAMP now redirect to seizure notices with FBI and DoJ seals and the nameservers have been updated to ns1.fbi.seized.gov and ns2.fbi.seized.gov.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
RAMP was created in 2021 by individuals linked to the now-defunct Babuk ransomware group.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Another key operator, known as 'Stallman,' was still the forum’s administrator when the takedown occurred.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Stallman played a central role in maintaining trust, enforcing rules, and managing the platform’s technical operations.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
RAMP was created by individuals closely affiliated with the Russian security services as a response to the ransomware-as-a-service (RaaS) sprawl.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
RAMP was a prime hub for new and low-to-mid-tier ransomware groups to promote themselves, offer services, and be as visible as possible.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Many notorious ransomware groups, including LockBit, ALPHV/BlackCat, Conti, DragonForce, Qilin, Nova, Radiant, and RansomHub, operated on this forum at various points.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
Stallman issued an official comment regarding the RAMP seizure on January 28, confirming there were no plans to rebuild.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The RAMP takedown represents a meaningful disruption to a core piece of criminal infrastructure.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
-
The RAMP takedown will mostly impact low-tier actors, disrupt distribution and sales for underground sellers, have minimal impact on top-tier groups, and reduce Russian security services' visibility into ransomware processes and sellers.
First reported: 29.01.2026 15:051 source, 1 articleShow sources
- FBI Takes Down RAMP Ransomware Forum — www.infosecurity-magazine.com — 29.01.2026 15:05
Similar Happenings
Black Basta Leader Identified and Added to Interpol's Red Notice List
Law enforcement in Ukraine and Germany have identified Oleg Evgenievich Nefedov, a 35-year-old Russian national, as the leader of the Black Basta ransomware gang. Nefedov, known by multiple aliases, has been added to Europol's 'Most Wanted' and Interpol's 'Red Notice' lists. Ukrainian police, in collaboration with German authorities, identified two additional individuals involved in initial network breaches and privilege escalation for ransomware attacks. These individuals were found to be 'hash crackers', specializing in extracting passwords from account databases. Raids in Ukraine seized digital storage devices and cryptocurrency assets. Black Basta has targeted over 500 companies globally and is estimated to have earned hundreds of millions of dollars in cryptocurrency. Nefedov is believed to have ties to Russian intelligence agencies and was arrested in Armenia but secured his freedom. The group's internal chat logs leaked, revealing its structure and key members, and its data leak site was taken down in February 2025. Former affiliates may have migrated to the CACTUS ransomware operation.
Conti Ransomware Member Extradited from Ireland to US
Oleksii Oleksiyovych Lytvynenko, a 43-year-old Ukrainian national, has been extradited from Ireland to the United States and appeared in a Tennessee court on charges related to the Conti ransomware operation. He is accused of conspiring to deploy Conti ransomware, extorting over $500,000 in cryptocurrency from victims in the Middle District of Tennessee, and publishing stolen information. The Conti ransomware operation has been linked to over 1,000 victims worldwide, with ransom payments exceeding $150 million as of January 2022. Lytvynenko faces charges that could lead to 25 years in prison, including 20 years for wire fraud conspiracy and 5 years for computer fraud conspiracy. He was arrested in July 2023 by Irish authorities and detained until his extradition. The Conti group, initially a ransomware operation, evolved into a larger cybercrime syndicate, controlling multiple malware operations. After shutting down, its members have infiltrated other cybercrime groups. The FBI estimates Conti's malware was used in more critical infrastructure attacks than any other ransomware variant.
Volodymyr Tymoshchuk Charged for LockerGoga, MegaCortex, Nefilim Ransomware Operations
Ukrainian national Volodymyr Viktorovich Tymoshchuk has been charged for his role as the administrator of the LockerGoga, MegaCortex, and Nefilim ransomware operations. Tymoshchuk is accused of orchestrating attacks on hundreds of companies, leading to millions of dollars in damages. He is also linked to JSWORM, Karma, Nokoyawa, and Nemty ransomware gangs. Tymoshchuk faces multiple charges related to computer fraud, unauthorized access, and threatening to disclose confidential information. The U.S. Department of State is offering a reward of up to $11 million for information leading to his arrest. Additionally, Artem Aleksandrovych Stryzhak, a Ukrainian national, pleaded guilty to conducting Nefilim ransomware attacks targeting high-revenue businesses across the United States and other countries. Stryzhak was arrested in Spain in June 2024 and extradited to the U.S. on April 30, 2025. He admitted to computer fraud conspiracy charges and faces up to 10 years in prison, with sentencing scheduled for May 6, 2026. Stryzhak obtained access to the Nefilim ransomware code in June 2021 and targeted large corporations, using custom-tailored malware and threatening to leak stolen data unless ransom demands were met. Stryzhak asked a co-conspirator whether he should choose a different username to avoid detection by authorities. Nefilim ransomware has been rebranded as Fusion, Milihpen, Gangbang, Nemty, and Karma.
LockBit 4.0 Leak Exposes Disorganized Ransomware Ecosystem
LockBit 4.0's affiliate panel was compromised in May 2025, revealing a chaotic and disorganized ransomware ecosystem. The leak exposed thousands of chat messages, ransomware builds, and internal data, showing that affiliates operate with little oversight and vary widely in professionalism. The leak highlights the unpredictability and fragmentation of the ransomware-as-a-service (RaaS) landscape, making it harder for defenders to prepare and respond to attacks. The leak occurred on May 7, 2025, and included over 4,000 chat messages, thousands of ransomware builds, internal user tags, and cryptowallet data. The exposed communications revealed that affiliates often ignore victims, deliver broken decryption tools, and dodge payments to the LockBit platform. Some affiliates even targeted prohibited entities, including Russian state organizations. The leak underscores the difficulty in defending against such fragmented and unpredictable threats.
BlackSuit Ransomware Infrastructure Disrupted in International Law Enforcement Operation
On July 24, 2025, an international law enforcement operation led by the U.S. Department of Homeland Security's Homeland Security Investigations (HSI) targeted the BlackSuit ransomware gang. The operation resulted in the takedown of four servers and nine domains, as well as the seizure of over $1 million in cryptocurrency. BlackSuit, also known as Royal, has been active since 2022 and has targeted over 450 victims in the U.S., including critical infrastructure sectors such as education, healthcare, energy, and government entities. The operation involved multiple U.S. agencies and international partners from the UK, Germany, Ireland, France, Canada, Ukraine, and Lithuania. The goal is to disrupt the ransomware ecosystem and hold cybercriminals accountable.