Categories: Cyber Security News

Babuk2 Ransomware Issuing Fake Extortion Demands With Data from Old Breaches

The Babuk2 ransomware group has been caught issuing extortion demands based on false claims and recycled data from previous breaches.

This revelation comes from recent investigations conducted by the Halcyon RISE Team, shedding light on a concerning trend in the world of cybercrime.

The Babuk2 group, also known as Babuk-Bjorka, has been making waves with public announcements of numerous attacks.

However, these claims have not been corroborated by third parties or the alleged victims, raising suspicions about the authenticity of these incidents.

Halcyon analysts identified that the group appears to be leveraging data from earlier breaches to support their extortion claims.

Many of the purported victims were previously targeted by other ransomware groups such as RansomHub, FunkSec, LockBit, and even the original Babuk team.

What makes this situation particularly alarming is the lack of evidence supporting any new, live ransomware encryption or fresh network intrusions.

The Halcyon RISE Team’s analysis suggests that the data being used is recycled from past incidents, despite Babuk2’s claims of conducting multiple attacks in early 2025.

The Deceptive Nature of Babuk2’s Operations

The Babuk2 operation seems to be capitalizing on the notoriety of the original Babuk ransomware, which was active in 2021.

By using the Babuk name, the group aims to establish credibility in the cybercriminal underworld.

The administrator, known as Bjorka, has been active on various forums and Telegram, with a history of involvement in other data breaches and extortion attempts.

This tactic of issuing fake extortion demands poses significant risks to businesses, both financially and reputationally.

Even if the attack claims are false, the mere threat can pressure organizations into paying ransoms or investing in unnecessary remediation measures.

It shows the critical importance of due diligence and independent verification of any reported network intrusions.

The high-profile nature of some of Babuk2’s claims, including an alleged significant incident targeting Indian military and government data, necessitates heightened vigilance among decision-makers and cybersecurity professionals.

As the cybersecurity landscape continues to evolve, it’s crucial for organizations to stay informed and consult with experts to accurately interpret and respond to such threats.

The Babuk2 case serves as a stark reminder of the deceptive tactics employed by cybercriminals and the need for robust verification processes in the face of extortion attempts.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

The post Babuk2 Ransomware Issuing Fake Extortion Demands With Data from Old Breaches appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack

A North Korean threat group known as Kimsuky has been caught running a cyberattack campaign…

11 minutes ago

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

Two malicious versions of the popular JavaScript HTTP library Axios were briefly published to the…

11 minutes ago

Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users

A coordinated phishing campaign has been quietly targeting banking customers across the Philippines since early…

12 minutes ago

When the story is the strategy: Memphis, misdirection, and the politics of perception

During a visit to Memphis on March 23, 2026, President Donald Trump credited the Memphis…

27 minutes ago

Reports: US fighter jet downed over Iran, status of crew unknown

Plumes of smoke rise following an explosion on March 5, 2026 in Tehran, Iran. (Photo…

27 minutes ago

11 Games in the indie.io Franchise Sale on Steam

Indie publishing platform indie.io just launched a Franchise Sale on Steam, and there are a…

35 minutes ago

This website uses cookies.