Ragnar Locker Ransomware Group Dismantled

~2 min read | Published on 2023-10-26, tagged ArrestedRansomware using 261 words.

An international operation arrested one of the developers of the Ragnar Locker ransomware group and seized several of the group's servers.

Seizure Banner on Ragnar Locker's site


The operation involved law enforcement authorities from 11 countries and was launched in May 2021 by the French National Gendarmerie and coordinated by Europol and Eurojust. The investigators reportedly focused on the identification and takedown of servers used by the ransomware group. The group is suspected of having carried out ransomware attacks against 168 companies worldwide since 2020.
The operation culminated in a week of action from October 16 to October 20. Searches were carried out at properties associated with the group in the Czech Republic, Spain, and Latvia. The actions resulted in the seizure of nine servers; five in the Netherlands, two in Germany, and two in Sweden.
The operation resulted in the apprehension and questioning of five suspects in the Czech Republic, Spain, and Latvia. The sixth and main suspect was arrested in Paris, on October 16, and his home in Czechia searched. He is suspected of being a developer of the Ragnar group. He was presented before the Paris Judicial Court.
The operation was the third of its kind conducted against the Ragnar Locker Group. The first operation took place in September 2021. It involved French, Ukrainian, and US authorities. It led to the arrest of two suspects in Ukraine. The investigators also seizied $1.3 million in cryptocurrencies and $375,000 in cash.
The second operation was conducted in October 2022, by French, Canadian, and US authorities. It resulted in the arrest of one suspect in Canada.

Comments (7)


Low OPSEC coders2023-10-30
931522fb

Impressive take down, obviously some very intelligent folks to write that software, most likely the usual though, registered their servers with PII and used BTC exchanges registered with PII, could have exposed PII in their source code but unlikely something that exotic.

Shitman2023-10-31
e71cf37f

Shit shit shit

Notepad2023-11-04
5c64e550

What a pitty that LE doesn´t go after real criminals. I mean real criminals don´t know shit about data structures and object oriented programming and all that other stuff those ransomcoders know.

howIsCS101?2023-11-10
5333b8af

they are real criminals.

PEN/IS2023-11-11
68c2314c

miss their databases , btw really good leaks , helped me financially

dopeaf2023-11-19
a7561600

where is the leak??

Jayen2023-11-13
5769e96f

What this is