Monday, April 21, 2025
Homecyber securityBlackLock Ransomware Strikes Over 40 Organizations in Just Two Months

BlackLock Ransomware Strikes Over 40 Organizations in Just Two Months

Published on

SIEM as a Service

Follow Us on Google News

In a concerning escalation of cyber threats, the BlackLock ransomware group has executed a series of attacks on over 40 organizations across various sectors in the first two months of 2025.

This surge in activity positions BlackLock as one of the most active and formidable ransomware-as-a-service (RaaS) operators of the year.

The group’s tactics, including fast encryption and strategic use of leak sites, have made it a significant threat in the cybersecurity landscape.

- Advertisement - Google News

Impact Across Industries

BlackLock’s attacks have been particularly devastating in the construction and real estate sectors, with these industries emerging as frequent targets.

Additionally, IT service providers and government agencies have also been prime targets, reflecting the group’s focus on high-value assets and complex operational structures.

The DarkAtlas Research Team notes that nearly a quarter of the attacks have targeted government agencies, often employing both ransomware and destructive wipers to maximize disruption and leverage.

BlackLock Ransomware
Ransom note titled “HOW_RETURN_YOUR_DATA.TXT

The group’s ability to execute attacks across different operating systems, thanks to its use of Golang for cross-platform compatibility, has been a key factor in its success.

BlackLock employs advanced encryption techniques, including ChaCha20 for file encryption and RSA-OAEP for key encryption, allowing it to efficiently encrypt files on shared networks using the Server Message Block (SMB) protocol.

Evolution and Tactics

BlackLock is identified as a rebranded version of the notorious Eldorado ransomware group, which faced increased scrutiny and pressure from law enforcement and cybersecurity researchers.

By rebranding, BlackLock has refined its operational model, enhanced its capabilities, and introduced more targeted attack strategies.

The group actively recruits key players, known as traffers, to support the early stages of ransomware attacks, driving malicious traffic and establishing initial access for campaigns.

The rise of BlackLock underscores a broader shift in the ransomware landscape, where RaaS platforms have lowered the barrier to entry for threat actors, allowing them to scale operations rapidly.

Organizations must adapt to this evolving threat landscape by implementing robust cybersecurity strategies, including advanced threat detection and incident response, to mitigate the risks associated with BlackLock and similar threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a fresh batch of bug...

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing...

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a fresh batch of bug...

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing...

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...