Cyber Security News

Everest Ransomware Gang Leak Site Hacked and Defaced

The Everest ransomware gang, a Russia-linked cybercriminal organization, faced an unexpected setback this weekend when its dark web leak site was hacked and defaced. 

The site, typically used to publish stolen data as part of the gang’s extortion tactics, was replaced with a blunt message: “Don’t do crime, CRIME IS BAD xoxo from Prague.”

At the time of writing, the defacement remains active, leaving cybersecurity experts speculating about whether the attackers also accessed sensitive data stored on Everest’s servers. 

The incident highlights the vulnerabilities even sophisticated criminal groups face in the ever-evolving cyber landscape.

Who Is the Everest Ransomware Gang?

Since its inception in December 2020, Everest has gained notoriety for its high-profile attacks on organizations worldwide. 

The gang has claimed responsibility for breaches at NASA, the Brazilian government, and cannabis retailer Stiizy, where it allegedly stole personal data from over 420,000 customers.

Application Security is no longer just a defensive play, Time to Secure -> Free Webinar

Everest employs advanced techniques to infiltrate networks, including exploiting compromised credentials and leveraging Remote Desktop Protocol (RDP) for lateral movement. Their toolkit includes:

  • ProcDump: Used for memory dumping to extract sensitive information.
  • SoftPerfect Network Scanner: A tool for network discovery and mapping.
  • Cobalt Strike Beacons: Employed to maintain persistent access within compromised systems.

Initially focused on encrypting files and demanding ransoms, Everest has recently shifted toward functioning as an Initial Access Broker (IAB). 

This business model involves breaching corporate networks and selling access to other threat actors for subsequent attacks.

TechCrunch reports that the defacement of Everest’s leak site marks a rare instance of cybercriminals being targeted by hackers themselves. 

The site, hosted on the Tor network at ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion, plays a critical role in Everest’s double extortion strategy. 

By publicly naming victims and leaking stolen data, ransomware gangs increase pressure on organizations to pay hefty ransom.

Security experts believe that the attackers exploited vulnerabilities in Everest’s web infrastructure, potentially gaining access to their command-and-control (C2) servers. 

However, it remains unclear whether the breach extended beyond defacement to include theft of sensitive internal data.

Dynamics in Ransomware Attacks

The attack on Everest’s infrastructure comes amid shifting global ransomware trends. While ransomware and extortion attacks have risen overall, recent reports indicate that victim payments dropped significantly during 2024. 

This decline is attributed to businesses adopting stronger backup strategies and refusing to negotiate with attackers.

Law enforcement agencies have also ramped up efforts against ransomware groups, successfully disrupting the operations of major players like LockBit and Radar in recent months. 

However, experts caution that criminal groups like Everest often rebuild their infrastructure or rebrand under new identities after setbacks like this one.

The defacement of Everest’s leak site reminds us that even sophisticated cybercriminal organizations are not immune to attacks. 

While this incident may temporarily disrupt Everest’s operations, cybersecurity researchers warn that the group could quickly recover or adapt its tactics.

The identity of the Prague-based hackers responsible for defacing Everest’s leak site remains unknown. Their motivations, whether ethical hacking or personal vendetta, are equally unclear. 

However, their actions have sparked conversations about vigilante justice in cyberspace.

As cybersecurity communities continue to monitor developments surrounding this incident, organizations worldwide are reminded of the importance of robust defenses against ransomware threats and perhaps even against unexpected allies operating in the shadows of the dark web.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try 50 Request for Free

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

A new information-stealing malware dubbed "PupkinStealer" has been identified by cybersecurity researchers, targeting sensitive user…

9 hours ago

Malware Defense 101 – Identifying and Removing Modern Threats

The cybersecurity landscape in 2025 is defined by increasingly sophisticated malware threats, with attackers leveraging…

18 hours ago

AI Security Frameworks – Ensuring Trust in Machine Learning

As artificial intelligence transforms industries and enhances human capabilities, the need for strong AI security…

19 hours ago

Preventing Phishing Attacks on Cryptocurrency Exchanges

Cryptocurrency exchanges are intensifying security measures in 2025 to focus on preventing phishing attacks, as…

21 hours ago

Adversarial Machine Learning – Securing AI Models

As AI systems using adversarial machine learning integrate into critical infrastructure, healthcare, and autonomous technologies,…

24 hours ago

10 Best NGINX Monitoring Tools – 2025

NGINX monitoring tools ensure NGINX web servers' optimal performance and reliability. These tools provide comprehensive…

1 day ago