FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

Jan 29, 2026

The FBI has seized control of the notorious RAMP cybercrime forum — a long-running online platform that ransomware gangs, initial access brokers, and malware operators used to advertise services, recruit affiliates, and trade illicit tools and access credentials.

Both RAMP’s clearnet domain (ramp4u[.]io) and its Tor site are now displaying federal seizure banners indicating that the forum has been taken offline by U.S. law enforcement.

This action, coordinated with the United States Attorney’s Office for the Southern District of Florida and the Department of Justice’s Computer Crime and Intellectual Property Section, represents a major disruption to one of the few cybercrime hubs that openly tolerated ransomware-related activity.

What Happened?

On January 28, 2026, the FBI executed a seizure operation that took over RAMP’s infrastructure, including its public domain and hidden Tor services. Both now display official seizure notices indicating that the FBI has assumed control.

Domain name servers for the forum were switched to ns1.fbi.seized.gov and ns2.fbi.seized.gov, signaling full domain control and giving law enforcement potential access to server data such as user email addresses, IP addresses, private messages, and other records.

An alleged former forum operator known as “Stallman” publicly confirmed the seizure on an underground forum, acknowledging that law enforcement had taken control of the site’s infrastructure.

The FBI has not yet issued a formal public statement or press release regarding the operation.

What Was RAMP?

RAMP (originally launched in July 2021) was created following the banning of ransomware discussions by other major Russian-speaking hacking forums like Exploit and XSS, which came under pressure from law enforcement after high-profile incidents such as the Colonial Pipeline attack.

Positioning itself as “one of the last places ransomware was allowed,” RAMP quickly became a central hub for ransomware-as-a-service (RaaS) operators, initial access brokers, and other cybercriminal communities seeking to buy/sell malware, access, stolen data, and exploit services.

The forum was tied to threat actors including the operator “Orange” (also known as Wazawaka/BorisElcin) — who was previously linked to the Babuk ransomware group.

Why This Matters

Law Enforcement Gains Insight

The seizure gives U.S. authorities potential access to vast troves of forum data, including user identities and communications — which may lead to future arrests and indictments of threat actors who operated with poor operational security.

Disruption of Cybercrime Ecosystem

RAMP’s removal disrupts an important channel for ransomware recruitment, collaboration, and commerce. With fewer centralized forums that openly tolerate ransomware activity, threat actors may be forced to adopt more clandestine and fragmented communications — complicating their operations but also potentially making them harder to track.

Shifts in Tactics

Criminals displaced by RAMP’s seizure are likely to shift to alternative platforms, encrypted messaging channels, or emerging underground markets — requiring defenders to adjust threat monitoring approaches accordingly.

Threat Impact Table

Threat Aspect

Impact

RAMP forum seizure

Significant disruption

Loss of central ransomware hub

Yes

Law enforcement access to user data

Possible

Direct arrests reported

Not yet

Shift to decentralized channels

Expected

Ransomware recruitment inhibited

Short-term

Key: Confirmed / Unconfirmed

What Should Security Teams Do?

1. Monitor Emerging Channels
With RAMP gone, threat actors will likely migrate to new forums or encrypted platforms. SOC and threat intel teams should broaden monitoring scopes.

2. Analyze Potential Indicators
Data seized from RAMP may yield indicators of compromise (IOCs) over time. Staying updated via threat feeds and law enforcement disclosures will be critical.

3. Review Ransomware Defenses
Reinforce ransomware protections such as endpoint detection, network segmentation, and incident response readiness. Proactive defenses limit opportunities for attackers even as they evolve.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

Jan 29, 2026

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Jan 27, 2026

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Jan 22, 2026

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Jan 20, 2026

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Jan 19, 2026

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Jan 14, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.