Friday, May 9, 2025
Homecyber securityBabuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Published on

SIEM as a Service

Follow Us on Google News

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is issuing extortion demands based on false claims.

Despite announcing numerous attacks, there is no third-party confirmation or evidence from victims that these incidents have actually occurred.

This strategy involves reusing data from earlier breaches to support their extortion claims, targeting organizations with threats that may not be backed by real attacks.

- Advertisement - Google News

Background and Tactics of Babuk2

Babuk2, also known as Babuk-Bjorka, emerged in January 2025 and is not a direct continuation of the original Babuk ransomware, which was active in 2021.

The group appears to leverage the Babuk name to gain credibility.

Its administrator, Bjorka, has been active on various forums and Telegram, previously associated with other data breaches and extortion attempts.

Many of the victims listed in Babuk2’s announcements were previously targeted by other ransomware groups such as RansomHub, FunkSec, LockBit, and even the original Babuk team.

This recycling of data from past incidents suggests that Babuk2 is more focused on creating a perception of activity rather than conducting actual attacks.

Impact on Businesses

The false claims by Babuk2 pose significant financial and reputational risks to businesses.

Even if the attack claims are unfounded, the mere threat can pressure organizations into paying ransoms or investing in unnecessary remediation measures.

It is crucial for business leaders to conduct thorough, independent investigations of any reported breaches to verify if the data being used is from a new breach or simply recycled from previous incidents.

According to the Report, this due diligence is essential to prevent unnecessary panic and financial loss.

Given the high-profile nature of some claims, including an alleged incident targeting Indian military and government data, decision-makers must remain alert and consult with cybersecurity experts to accurately interpret such threats.

Babuk2’s extortion demands appear to be unsubstantiated, relying on previously leaked data to boost credibility and drive ransom payments.

Organizations facing such claims should adopt a proactive approach by verifying network integrity and checking for signs of genuine, new attacks.

This strategy will help mitigate the risks associated with false extortion demands and ensure that resources are allocated effectively in response to actual threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SonicWall Unveils New Firewalls and Comprehensive Managed Cybersecurity Service

SonicWall has unveiled a new line of advanced firewalls and a comprehensive managed cybersecurity...

China-Backed Hackers Target Exiled Uyghur Community with Malicious Software

Senior members of the World Uyghur Congress (WUC) living in exile were targeted with...

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and...

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SonicWall Unveils New Firewalls and Comprehensive Managed Cybersecurity Service

SonicWall has unveiled a new line of advanced firewalls and a comprehensive managed cybersecurity...

China-Backed Hackers Target Exiled Uyghur Community with Malicious Software

Senior members of the World Uyghur Congress (WUC) living in exile were targeted with...

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and...