Thursday, April 24, 2025
Homecyber securityBabuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Published on

SIEM as a Service

Follow Us on Google News

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is issuing extortion demands based on false claims.

Despite announcing numerous attacks, there is no third-party confirmation or evidence from victims that these incidents have actually occurred.

This strategy involves reusing data from earlier breaches to support their extortion claims, targeting organizations with threats that may not be backed by real attacks.

- Advertisement - Google News

Background and Tactics of Babuk2

Babuk2, also known as Babuk-Bjorka, emerged in January 2025 and is not a direct continuation of the original Babuk ransomware, which was active in 2021.

The group appears to leverage the Babuk name to gain credibility.

Its administrator, Bjorka, has been active on various forums and Telegram, previously associated with other data breaches and extortion attempts.

Many of the victims listed in Babuk2’s announcements were previously targeted by other ransomware groups such as RansomHub, FunkSec, LockBit, and even the original Babuk team.

This recycling of data from past incidents suggests that Babuk2 is more focused on creating a perception of activity rather than conducting actual attacks.

Impact on Businesses

The false claims by Babuk2 pose significant financial and reputational risks to businesses.

Even if the attack claims are unfounded, the mere threat can pressure organizations into paying ransoms or investing in unnecessary remediation measures.

It is crucial for business leaders to conduct thorough, independent investigations of any reported breaches to verify if the data being used is from a new breach or simply recycled from previous incidents.

According to the Report, this due diligence is essential to prevent unnecessary panic and financial loss.

Given the high-profile nature of some claims, including an alleged incident targeting Indian military and government data, decision-makers must remain alert and consult with cybersecurity experts to accurately interpret such threats.

Babuk2’s extortion demands appear to be unsubstantiated, relying on previously leaked data to boost credibility and drive ransom payments.

Organizations facing such claims should adopt a proactive approach by verifying network integrity and checking for signs of genuine, new attacks.

This strategy will help mitigate the risks associated with false extortion demands and ensure that resources are allocated effectively in response to actual threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...