FBI Seizes RAMP Ransomware Forum in Major Cybercrime Crackdown

FBI seizure RAMP cybercrime forum ransomware cybercrime cybersecurity
Jim Gagnard
Jim Gagnard

Board Advisor

 
February 9, 2026 3 min read
FBI Seizes RAMP Ransomware Forum in Major Cybercrime Crackdown

TL;DR

The FBI, in collaboration with US authorities, has seized the RAMP cybercrime forum, a prominent platform for ransomware operations, affiliate recruitment, and the sale of compromised credentials. This takedown, involving key figures and disrupting a significant revenue stream for cybercriminals, forces threat actors to find new channels and highlights the ongoing need for enhanced organizational cybersecurity measures.

FBI Seizes RAMP Cybercrime Forum

The FBI has seized control of the RAMP cybercrime forum, a platform known for facilitating ransomware operations. The seizure was a collaborative effort involving the FBI, the US Attorney’s Office for the Southern District of Florida, and the US Justice Department’s Computer Crime and Intellectual Property Section (CCIPS).

RAMP Seizure

Image courtesy of Bitdefender

The forum's dark web and regular website domains now display a notice indicating the takeover by law enforcement. The seizure banner includes a winking Masha from the Russian children's TV series "Masha and the Bear," seemingly taunting the forum's operators. RAMP's nameservers now point to ns1.fbi.seized.gov and ns2.fbi.seized.gov, confirming the seizure.

RAMP's Rise and Fall

RAMP (Russian Anonymous MarketPlace) emerged in mid-2021, quickly gaining popularity after major Russian-language hacking forums banned ransomware-related content. This followed increased scrutiny after the Colonial Pipeline attack by the DarkSide gang.

RAMP became a hub for:

  • Recruiting ransomware affiliates
  • Selling compromised business network credentials by initial access brokers
  • Trading stolen data and tools

Infamous ransomware groups like ALPHV/BlackCat, Qilin, DragonForce, and RansomHub used RAMP to promote their activities. The forum boasted over 14,000 users, requiring either proof of activity on other hacking forums or a $500 fee for membership. According to Rapid7, in the summer of 2024, RAMP had revenues of around $250,000.

Key Personnel and Impact

One of RAMP's key figures, Mikhail Matveev (also known as "Orange", "Wazawaka", and "BorisElcin"), was placed on the FBI's most wanted list and arrested in Russia in 2024.

Following the seizure, another alleged operator, "Stallman," acknowledged the takedown on another hacking forum, stating, "This event destroyed years of my work to create the most free forum in the world... This is the risk we all take." Stallman's post indicates that cybercriminal activities will likely continue through other channels.

This takedown represents a significant disruption to cybercriminal infrastructure, forcing threat actors to adapt and potentially exposing them to new security risks. Authorities may now have access to user data, including email and IP addresses, which could lead to further arrests.

Forum Details and Aftermath

RAMP was founded in 2012 and rebranded in 2021. It served Russian, Chinese, and English speakers, offering discussion groups, cyberattack tutorials, and a marketplace for malware and services. The platform had strict vetting processes, including a $500 fee for anonymous participation.

FBI Seizure Notice

Image courtesy of Ars Technica

The seizure notice encourages individuals to submit tips through the FBI’s IC3 portal. DNS records confirm that the RAMP domain servers now belong to the FBI.

RAMP's Origins and Key Players

The RAMP cybercrime forum emerged in July 2021 after popular Russian-speaking forums like Exploit and XSS prohibited ransomware promotion due to increased law enforcement pressure following the Colonial Pipeline attack.

RAMP was launched by "Orange" (Mikhail Matveev), previously an administrator for the Babuk ransomware operation. Matveev confirmed his role in creating RAMP in an interview with Recorded Future. In 2023, Matveev was indicted by the U.S. Department of Justice for his involvement in ransomware operations like Babuk, LockBit, and Hive.

Enhance Your Organization's Security Posture with Gopher Security

The RAMP forum takedown highlights the ongoing need for robust cybersecurity measures. As threat actors adapt, organizations must enhance their defenses with advanced security solutions. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography.

Explore our services or contact us to learn how Gopher Security can protect your organization from evolving cyber threats.

Jim Gagnard
Jim Gagnard

Board Advisor

 

30-year CEO experiences of leading multiple $MM exits. Excellent operator of managing big enterprise companies.

Related News

Critical OpenSSL RCE Vulnerability CVE-2025-15467 Explained
CVE-2025-15467

Critical OpenSSL RCE Vulnerability CVE-2025-15467 Explained

Urgent alert! A critical OpenSSL vulnerability (CVE-2025-15467) with a CVSS score of 9.8 has been disclosed. Learn how this pre-authentication RCE flaw impacts your systems and get actionable steps for immediate patching. Don't wait, secure your infrastructure now!

By Brandon Woo February 6, 2026 5 min read
common.read_full_article
SolarWinds Addresses Critical RCE and Auth Bypass Vulnerabilities
SolarWinds Web Help Desk vulnerabilities

SolarWinds Addresses Critical RCE and Auth Bypass Vulnerabilities

Critical vulnerabilities in SolarWinds Web Help Desk allow RCE & auth bypass. Patch urgently to protect your systems. Learn more and secure your network today!

By Jim Gagnard February 5, 2026 4 min read
common.read_full_article
AI in Cybersecurity: The Battle Between Agents and Humans
AI agents cybersecurity

AI in Cybersecurity: The Battle Between Agents and Humans

Wiz Research pitted AI agents against human hackers in web hacking challenges. Discover AI's surprising capabilities and limitations in cybersecurity for 2026. Read the full findings!

By Alan V Gutnov February 4, 2026 4 min read
common.read_full_article
Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day
CVE-2026-21509

Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day

Microsoft Office emergency patch released for CVE-2026-21509, an actively exploited zero-day. Learn vulnerability details, affected products, and crucial mitigation steps to protect your system now!

By Edward Zhou February 2, 2026 3 min read
common.read_full_article