The BlackMatter ransomware gang has reportedly decided to call it quits, citing recent operations against it from the law enforcement agencies.
The news comes courtesy of a screenshot of a message allegedly shared by BlackMatter operatives with their “clients”. The message, posted on November 1, and originally shared by cybersecurity research group VX-Underground, suggested the group will shutdown within 48 hours.
"Due to certain unsolvable circumstances associated with pressure from the authorities (part of the team is no longer available, after the latest news) - project is closed,” reads a rough English translation of the Russian post.
We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.
Like most notorious ransomware gangs, BlackMatter operates through a ransomware-as-a-service (RaaS) model, and hosts a website to engage and communicate with its affiliates, which is where the message was posted.
Rise like a phoenix
Even if the post is legitimate, the message doesn’t mean that the ransomware gang will stop extorting victims. In fact, in the post itself, BlackMatter asks affiliates to get in touch in case they need the decryptor for BlackMatter’s ransomware, hinting that it wouldn’t stop its affiliates from taking more victims.
Furthermore, reporting on the development, BleepingComputer argues that although the group claimed that it will close its door within 48 hours, the time has come and gone but the gang’s Tor payment portal and data leak website remain operational.
Realistically speaking, such shutdowns are a mere hogwash, and a prelude to the ransomware gang re-emerging under a new name, says BleepingComputer.
Don't rely on such shutdowns to save yourself from ransomware attacks. Rather use one of these best firewall apps and services to shield your networks, and ensure your computers are running these best endpoint protection tools to add another layer of defense against cyber-attacks.