{"id":4303,"date":"2026-01-29T15:37:07","date_gmt":"2026-01-29T15:37:07","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2026\/01\/29\/fbi-takes-down-ramp-ransomware-forum\/"},"modified":"2026-01-29T15:37:07","modified_gmt":"2026-01-29T15:37:07","slug":"fbi-takes-down-ramp-ransomware-forum","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2026\/01\/29\/fbi-takes-down-ramp-ransomware-forum\/","title":{"rendered":"FBI Takes Down RAMP Ransomware Forum"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\">\n<div id=\"layout-5a457fc5-20f0-4eae-a3d6-99f979c959f9\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<div>\n<p>The notorious cybercriminal forum Russian Anonymous Marketplace (RAMP) has reportedly been taken down by the FBI.<\/p>\n<p> The news came on January 28, when several cyber threat intelligence (CTI) analysts noticed both RAMP clear and dark web sites were down and replaced by a law enforcement banner showing the message: \u201cThis site has been seized.\u201d<\/p>\n<\/div>\n<p>The banner says the FBI seized the site in collaboration with the US Attorney\u2019s Office for the Southern District of Florida and the US Justice Department\u2019s (DoJ) Computer Crime and Intellectual Property Section (CCIPS).<\/p>\n<\/p><\/div>\n<figure id=\"layout-4aed0fe2-d181-4e7d-bbb7-47dd8a0a3c4a\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"1\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/localimages\/d1e49ce9-3716-4af5-8696-f1b3c2d25248.png\" alt=\"Source: Infosecurity Magazine\"><figcaption>Source: Infosecurity Magazine<\/figcaption><\/figure>\n<div id=\"layout-7ac49597-f4dd-4047-aa5d-91e48bdcdb6a\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"2\">\n<p>The notice also taunts the RAMP operators with a message saying, &#8220;The Only Place Ransomware Allowed!&#8221; and an image of Masha, a Russian cartoon character, winking.<\/p>\n<p>While thew FBI has made no official statement at the time of writing, the domains linked to RAMP now redirect to seizure notices with FBI and DoJ seals and the nameservers have been updated to ns1.fbi.seized.gov and ns2.fbi.seized.gov, confirming the seizure by US law enforcement.<\/p>\n<h2><strong>RAMP: The Dark Web Forum Where Ransomware Is Allowed<\/strong><\/h2>\n<p>RAMP was created in 2012\u00a0as a site operating on the Tor network\u00a0but rose to prominence in 2021, operated by\u00a0people linked to the now defunct Babuk ransomware group. The RAMP forum in its current form was born after XSS and Exploit, the two main dark web forums in the Russian cybercrime landscape, as well as the English-speaking BreachForums, banned ransomware discussions.<\/p>\n<p>The message on the FBI banner trolls RAMP\u2019s position as the sole underground marketplace where talking about ransomware was allowed.<\/p>\n<p>One of the individuals behind RAMP was Mikhail Matveev, a Russian national, also known under the aliases Orange, Wazawaka and BorisElcin. Matveev was arrested in Russia in 2024.<\/p>\n<p>Another key operator, known as \u2018Stallman,\u2019 was still the forum\u2019s administrator when the takedown occurred.<\/p>\n<p>Rebecca Taylor, a threat intelligence researcher at Sophos, told <em>Infosecurity<\/em> that Stallman \u201cplayed a central role in maintaining trust, enforcing rules and managing the platform\u2019s technical operations.\u201d<\/p>\n<p>In a LinkedIn post shared after the takedown, Yelisey Bohuslavskiy, co-founder of intelligence firm Red Sense, explained that RAMP was created by individuals closely affiliated with the Russian security services as a response to the ransomware-as-a-service (RaaS) sprawl.<\/p>\n<p>He said that until 2020, Russian, Belarusian and Ukrainian services had strong visibility into the traditional, highly organized cybercriminal groups like Ryuk, Conti, REvil, Maze, Ragnar, Netwalker and others.<\/p>\n<p>\u201cPart of that visibility came through control over Exploit and XSS via security-affiliated admins. Then RaaS exploded. The model sprawled uncontrollably: even forum admins had zero control over affiliates. That was the problem to which RAMP was the answer,\u201d he added.<\/p>\n<p>According to the CTI expert, RAMP was a prime hub for new and low-to-mid-tier ransomware groups to promote themselves, offer services and \u201cbe as visible as possible.\u201d<\/p>\n<p>\u201cThis worked. One of the first things a new group or actor did was post on RAMP &#8211; effectively identifying themselves to the authorities. It also improved visibility into non-Russian-speaking crews and attracted the usual \u2018supply chain\u2019 sellers: logs, loaders, initial access, exploits, etc,\u201d Bohuslavskiy continued.<\/p>\n<p>Tammy Harper, a senior threat intelligence researcher at Flare, described RAMP as \u201cone of the most trusted ransomware-adjacent forums in the cybercrime ecosystem.\u201d<\/p>\n<p>She explained that the platform was \u201cwidely regarded as a high-trust escrow environment\u201d and functioned as the main discussion hub for ransomware operators, intermediaries and affiliates.<\/p>\n<p>Ben Clarke, a security operations center (SOC) manager at\u00a0CybaVerse, explained that the\u00a0reason for\u00a0RAMP&#8217;s\u00a0success was that &#8220;it offered criminals with a marketplace supporting the entire attack chain, from the ability to buy stolen credentials, promote malware or sell and purchase ransomware services.&#8221;<\/p>\n<p>Many notorious ransomware groups, including LockBit, ALPHV\/BlackCat, Conti, DragonForce, Qilin, Nova, Radiant and RansomHub, are understood to have operated on this forum at various points.<\/p>\n<h2><strong>RAMP Administrator Confirms Takedown, No Plans to Rebuild<\/strong><\/h2>\n<p>It has been reported that the individual known as Stallman issued an official comment regarding the RAMP seizure on January 28. The statement has circulated widely across underground discussion spaces.<\/p>\n<p>Taylor told <em>Infosecurity<\/em>, \u201cFollowing the seizure of RAMP, Stallman publicly stated on the XSS forum that the takedown had \u2018destroyed years of my work\u2019 and confirmed there were no plans to rebuild.\u201d<\/p>\n<p>\u201cThe post and takedown have driven significant chatter within underground communities, reflecting heightened concern, uncertainty and loss of confidence following the takedown,\u201d she added.<\/p>\n<\/p><\/div>\n<figure id=\"layout-b4951f12-6194-49a3-88cb-a12e590f9cb5\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"3\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/localimages\/5a3f652b-8f0a-486f-aeea-d7077d95ed58.png\" alt=\"Screenshot of the message shared on XSS by RAMP administrator known as Stallman. Source: Rebecca Taylor, Sophos\"><figcaption>Screenshot of the message shared on XSS by RAMP administrator known as Stallman. Source: Rebecca Taylor, Sophos<\/figcaption><\/figure>\n<div id=\"layout-70c7c8b2-a819-45d4-b1e1-6dace4e12caa\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"4\">\n<p>Sallman\u2019s decision not to create a new version of RAMP is likely linked to concerns about his own freedom. Bohuslavskiy noted that the RAMP admin is now \u201ca void asset for the Russian services\u201d and is likely next on the list following a spate of arrests of cybercriminals in 2025.<\/p>\n<h2><strong>Takedown<\/strong> <strong>Welcome, But Impact Limited<\/strong><\/h2>\n<p>The RAMP takedown represents \u201ca meaningful disruption to a core piece of criminal infrastructure,\u201d commented Flare\u2019s Harper. \u00a0<\/p>\n<p>Taylor told <em>Infosecurity<\/em>, \u201cThese operations not only disrupt and dismantle criminal infrastructure, but also sow mistrust, fear, and uncertainty among threat actors. The RAMP seizure is likely to provide valuable intelligence on criminal participants and create further opportunities for law enforcement action.\u201d<\/p>\n<p>Giomar Salazaar, a threat intelligence analyst at Outpost24, called\u00a0the takedown \u201canother major blow to the infrastructure supporting the digital extortion ecosystem,&#8221; while\u00a0Daniel Wilcock, a threat intelligence analyst at Talion, described it as a big win for law enforcement&#8221; and said it will provide &#8220;valuable information from the seizure around the threat actors using the services,&#8221; such as their emails and IP addresses plus access to the financial transactions that took place on the market.<\/p>\n<p>RedSense\u2019s Bohuslavskiy welcomed any takedown of ransomware-enabling infrastructure. However, he painted a more nuanced picture of what it means for the future of cybercrime.<\/p>\n<p>In his LinkedIn post, he mentioned four main likely consequences:<\/p>\n<ul>\n<li>The RAMP takedown will mostly impact low-tier actors as losing RAMP means losing market access and the ability to announce and \u2018launch\u2019 themselves<\/li>\n<li>It will also likely lead to major disruption to distribution and sales for underground sellers. However, Bohuslavskiy predicted that Telegram will absorb some of it<\/li>\n<li>It will have minimal impact on top-tier groups. This is because they understood RAMP\u2019s affiliation to ransomware and largely stayed away from it<\/li>\n<li>Russian security services will lose some visibility into ransomware processes and sellers<\/li>\n<\/ul>\n<p>Additionally,\u00a0Talion&#8217;s\u00a0Wilcock also highlighted that while the RAMP operator claims to have no plans to rebuild another marketplace, other criminals are likely to turn to alternative underground markets to support their crimes. &#8220;This means that while RAMP has been taken down, which will create some inconveniences for its users, its impact on the overall cyber crime ecosystem will be limited.<\/p>\n<p>Wilcock also noted that, &#8220;given that RAMP was heavily used by Russian criminals,&#8221; it is &#8220;highly unlikely&#8221; the operation will lead to actual arrests.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The notorious cybercriminal forum Russian Anonymous Marketplace (RAMP) has reportedly been taken down by the FBI. The news came on January 28, when several cyber threat intelligence (CTI) analysts noticed both RAMP clear and dark web sites were down and replaced by a law enforcement banner showing the message: \u201cThis site has been seized.\u201d The<\/p>\n","protected":false},"author":2,"featured_media":4304,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73-150x150.png",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73.png",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4303-b3db03cc-2cfb-4a51-9d80-f8f7dd856e73-146x146.png",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=4303"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4303\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/4304"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=4303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=4303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=4303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}