Darnley's Cyber Café

The Cyber Wars: The Fall of the BlackLock Empire

Darnley's Cyber Café Season 5 Episode 98

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 7:49

BlackLock, a ruthless ransomware gang, thought they were untouchable—until cybersecurity experts flipped the script. In this episode of Darnley’s Cyber Café, Darnley uncovers how a security firm hacked the hackers, dismantling their entire operation from the inside.

How did they do it? What critical mistakes led to BlackLock’s downfall? And what does this mean for the future of cybercrime?

Tune in for a thrilling deep dive into one of the biggest cyber takedowns yet

Click here to send future episode recommendation

Support the show

Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

The Cyber Wars: The Fall of the BlackLock Empire

Hey everyone, welcome back to Darnley’s Cyber Café! If you love a good “hack the hackers” story, you’re in for a treat today. This is one of those rare times when the good guys pull off a major win, and honestly, it feels like a plot twist straight out of a cyber-thriller.

Picture this: a ruthless ransomware gang, BlackLock—also known as El Dorado—was on a rampage, locking down systems, demanding ransom, and making life miserable for businesses and organizations worldwide. Then, enter Re-security, a cybersecurity firm that decided enough was enough. They found a flaw, exploited it, and took the whole operation down from the inside. Boom! Just like that, BlackLock was out of business.

It’s rare to hear stories like this, so let’s break it down, celebrate the win, and talk about what this means for the war against cybercrime.


Alright, let’s rewind a bit. BlackLock showed up in early 2024, and within months, they became a top-tier ransomware threat. By the end of the year, they were the 7th most active ransomware group, pulling off attacks like it was their full-time job (which, sadly, it was).

 Their targets? Government agencies, healthcare systems, universities—you name it. They were everywhere, encrypting files and demanding ransoms in a wave of destruction that surged over 1,400% in just a few months.

But here’s the thing about being a cybercriminal, which I like to say: if you live by hacking, you can die by hacking. And man, did they make it easy. Turns out, their dark web data leak site had a major security flaw—one that Re-security was more than happy to take advantage of.

(Insert a short 20-second pause or sound transition here)


So what happened? Re-security’s HUNTER team discovered a Local File Include (LFI) vulnerability, which is basically like finding a hidden backdoor in a fortress that’s supposed to be impenetrable. This flaw let them peek inside BlackLock’s infrastructure and grab:

  • Server configurations
  • SSH credentials
  • Login details and timestamps
  • Logs of stolen data and its storage locations

In short, they got everything.

Now, here’s where it gets even better. Not only did Re-security get this data, but they also acted on it. They warned cybersecurity teams before attacks happened, took over BlackLock’s infrastructure, and shut down their operations from the inside. And if that wasn’t embarrassing enough for the hackers, BlackLock’s own terrible security practices made it even easier, which I always feel is oxymoronic. 

You won’t believe this—but these elite cybercriminals were making the same rookie mistake they counted on their victims making. They were copy-pasting passwords across multiple accounts. Yep, the same amateurs who lecture people about password security were reusing their own credentials. That’s like a bank robber leaving their ID at the crime scene. You can’t make this stuff up.

(Short reflection pause – about 10 seconds)


Once Re-security infiltrated BlackLock’s systems, it was game over. Their infrastructure crumbled, their affiliates bailed, and to add insult to injury, another ransomware gang, DragonForce, came along and defaced their website.

Imagine that. You’re a terrifying cybercrime syndicate, and suddenly, another gang hijacks your site just to mock you. DragonForce exposed their secrets, leaked their internal messages, and pretty much declared them extinct. Whether this was cybercriminal infighting or just a flex, one thing’s for sure—BlackLock was done.

(Short transition music or sound effect)


Now, let’s get real for a second. Why is this such a big deal? Why am I parading around like this? Because for years, ransomware gangs have seemed untouchable. They extort businesses, hospitals, even entire governments, and walk away with millions. It’s been feeling like a one-sided battle. In the media, you will hear all sorts of horror stories, or about the latest hack, but do you really hear the wins? Nope.

But this time? The tables turned. This story proves that cybercriminals aren’t invincible. Cybersecurity firms are stepping up, not just playing defense, but actively going after these groups. They’re using intelligence, hacking skills, and strategic counterattacks to bring these gangs down. And it’s working and something I have been advocating to my fellow white-hats for years. 

(30-second discussion or anecdote on cyber defense strategies)


Now, before we pop the champagne, let’s remember—just because BlackLock is dead doesn’t mean ransomware is gone around the globe. These groups don’t disappear; they regroup, rebrand, and evolve. And with DragonForce taking advantage of BlackLock’s demise, we may have an even bigger problem on the horizon.

But here’s the message: ransomware gangs can be stopped. And for businesses and individuals, this is proof that cybersecurity isn’t just about protection—it’s about being proactive. The best way to stay ahead? Learn from these takedowns, improve security, and never assume the bad guys are unbeatable.

I always say to whomever I meet that these criminals look for the lowest hanging fruit. They target business and people who have not done their due diligence, nor following the basic cybersecurity practices. Just by following the simple basic instructions that I have been discussing about for years, will put you ahead and better protect you in the near future. I always hear form business and people on how inconvenient it is to have cybersecurity measures on their computers and infrastructure. Or they just remain ignorant to think they have done everything or has an overly-arrogant IT/Security professional who is not humble enough. I don’t mean to paint you fellow experts all with the same brush, but I just want to highlight that we are not perfect and we can always learn from each other. 


[Final Thoughts] Anyway, moving back into this story, I love stories like this. It’s not every day that we get to hear about cybercriminals getting a taste of their own medicine. But make no mistake—the fight isn’t over. Cybersecurity is a constant battle, and we’ll be here, keeping you informed and prepared.

Make sure to subscribe to Darnley’s Cyber Café for more cyber news, deep dives, and stories that keep you one step ahead. 

Until next time, keep your data locked down and your passwords unique! And remember—stay safe, stay secure, and knowledge is power!

[Outro Music Plays]