Thursday, May 8, 2025
Homecyber securityBlackLock Ransomware Strikes Over 40 Organizations in Just Two Months

BlackLock Ransomware Strikes Over 40 Organizations in Just Two Months

Published on

SIEM as a Service

Follow Us on Google News

In a concerning escalation of cyber threats, the BlackLock ransomware group has executed a series of attacks on over 40 organizations across various sectors in the first two months of 2025.

This surge in activity positions BlackLock as one of the most active and formidable ransomware-as-a-service (RaaS) operators of the year.

The group’s tactics, including fast encryption and strategic use of leak sites, have made it a significant threat in the cybersecurity landscape.

- Advertisement - Google News

Impact Across Industries

BlackLock’s attacks have been particularly devastating in the construction and real estate sectors, with these industries emerging as frequent targets.

Additionally, IT service providers and government agencies have also been prime targets, reflecting the group’s focus on high-value assets and complex operational structures.

The DarkAtlas Research Team notes that nearly a quarter of the attacks have targeted government agencies, often employing both ransomware and destructive wipers to maximize disruption and leverage.

BlackLock Ransomware
Ransom note titled “HOW_RETURN_YOUR_DATA.TXT

The group’s ability to execute attacks across different operating systems, thanks to its use of Golang for cross-platform compatibility, has been a key factor in its success.

BlackLock employs advanced encryption techniques, including ChaCha20 for file encryption and RSA-OAEP for key encryption, allowing it to efficiently encrypt files on shared networks using the Server Message Block (SMB) protocol.

Evolution and Tactics

BlackLock is identified as a rebranded version of the notorious Eldorado ransomware group, which faced increased scrutiny and pressure from law enforcement and cybersecurity researchers.

By rebranding, BlackLock has refined its operational model, enhanced its capabilities, and introduced more targeted attack strategies.

The group actively recruits key players, known as traffers, to support the early stages of ransomware attacks, driving malicious traffic and establishing initial access for campaigns.

The rise of BlackLock underscores a broader shift in the ransomware landscape, where RaaS platforms have lowered the barrier to entry for threat actors, allowing them to scale operations rapidly.

Organizations must adapt to this evolving threat landscape by implementing robust cybersecurity strategies, including advanced threat detection and incident response, to mitigate the risks associated with BlackLock and similar threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...