Cyber Security News

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is issuing extortion demands based on false claims.

Despite announcing numerous attacks, there is no third-party confirmation or evidence from victims that these incidents have actually occurred.

This strategy involves reusing data from earlier breaches to support their extortion claims, targeting organizations with threats that may not be backed by real attacks.

Background and Tactics of Babuk2

Babuk2, also known as Babuk-Bjorka, emerged in January 2025 and is not a direct continuation of the original Babuk ransomware, which was active in 2021.

The group appears to leverage the Babuk name to gain credibility.

Its administrator, Bjorka, has been active on various forums and Telegram, previously associated with other data breaches and extortion attempts.

Many of the victims listed in Babuk2’s announcements were previously targeted by other ransomware groups such as RansomHub, FunkSec, LockBit, and even the original Babuk team.

This recycling of data from past incidents suggests that Babuk2 is more focused on creating a perception of activity rather than conducting actual attacks.

Impact on Businesses

The false claims by Babuk2 pose significant financial and reputational risks to businesses.

Even if the attack claims are unfounded, the mere threat can pressure organizations into paying ransoms or investing in unnecessary remediation measures.

It is crucial for business leaders to conduct thorough, independent investigations of any reported breaches to verify if the data being used is from a new breach or simply recycled from previous incidents.

According to the Report, this due diligence is essential to prevent unnecessary panic and financial loss.

Given the high-profile nature of some claims, including an alleged incident targeting Indian military and government data, decision-makers must remain alert and consult with cybersecurity experts to accurately interpret such threats.

Babuk2’s extortion demands appear to be unsubstantiated, relying on previously leaked data to boost credibility and drive ransom payments.

Organizations facing such claims should adopt a proactive approach by verifying network integrity and checking for signs of genuine, new attacks.

This strategy will help mitigate the risks associated with false extortion demands and ensure that resources are allocated effectively in response to actual threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through seemingly…

44 minutes ago

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to a…

46 minutes ago

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane, which…

48 minutes ago

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North Korean…

50 minutes ago

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged…

4 hours ago

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser…

5 hours ago