{"id":50296,"date":"2023-01-26T18:56:00","date_gmt":"2023-01-26T18:56:00","guid":{"rendered":"http:\/\/11916c58-2dcf-4e0c-83ea-f14c780272ba"},"modified":"2023-01-26T18:56:00","modified_gmt":"2023-01-26T18:56:00","slug":"doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/","title":{"rendered":"DOJ takes down ransomware group with a &#8217;21st century cyber stakeout&#8217;"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7850760ac7b201152aa5db937df7d59fc2776fab\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=768\" alt=\"fbi-decision-to-withhold-kaseya-ransomware.jpg\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/485e04e6d23645c15c871b5ab7294067077f4251\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1024\" alt=\"fbi-decision-to-withhold-kaseya-ransomware.jpg\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280\" alt=\"fbi-decision-to-withhold-kaseya-ransomware.jpg\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280\" alt=\"fbi-decision-to-withhold-kaseya-ransomware.jpg\" width=\"1280\" height=\"855.1999999999999\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Dzelat \/ Shutterstock<\/span><\/figcaption><\/figure>\n<p>After a months-long covert operation, the US Justice Department (DOJ) and its international partners have <a href=\"https:\/\/www.justice.gov\/opa\/pr\/us-department-justice-disrupts-hive-ransomware-variant\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">taken down an international ransomware network<\/a> known as Hive, the agency announced Thursday. Since 2021, the <a href=\"https:\/\/www.zdnet.com\/article\/hive-hackers-are-exploiting-microsoft-exchange-servers-in-ransomware-spree\/\" rel=\"follow\">Hive ransomware group has targeted<\/a> more than 1,500 victims around the world, securing more than $100 million in ransom payments from hospitals, school districts, financial firms, and other entities.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/3-security-gadgets-i-never-leave-home-without\/\" rel=\"follow\"><strong>3 security gadgets I never leave home without<\/strong><\/a><\/p>\n<p>To dismantle the Hive network, the Justice Department operated a &#8220;21st century cyber stakeout&#8221;, according to Deputy Attorney General Lisa O. Monaco.<\/p>\n<div class=\"c-shortcodePinbox c-shortcodePinbox-single g-border-thin-light-top g-outer-spacing-top-medium g-outer-spacing-bottom-medium g-inner-spacing-bottom-small\">\n<h3 class=\"c-sectionHeading\"><strong>ZDNET<\/strong> Recommends<\/h3>\n<\/p><\/div>\n<p>&#8220;Our investigative team turned the tables on Hive, swiping their decryption keys, passing them to victims, and ultimately averting more than $130 million dollars in ransomware payments,&#8221; she said in a statement.&nbsp;<\/p>\n<p>The FBI first penetrated Hive&#8217;s computer networks in July 2022. During the operation, the agency managed to secure more than 300 decryption keys for Hive victims who were under attack. It also retrieved more than 1,000 additional decryption keys for prior Hive victims. By capturing those decryption keys, the FBI saved victims from having to pay $130 million in ransom demanded.&nbsp;<\/p>\n<p>On Thursday, the DOJ worked with German and Dutch law enforcement to seize control of the servers and websites that Hive used to communicate with its members.<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/\" rel=\"follow\"><strong>NSA and CISA alert: This phishing scam could give hackers control of your PC<\/strong><\/a><\/p>\n<p>Hive used a <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-as-a-service-negotiators-between-hackers-and-victims-are-now-in-high-demand\/\" rel=\"follow\">ransomware-as-a-service<\/a>&nbsp;model. Hive&#8217;s &#8220;developers&#8221; or &#8220;administrators&#8221; would develop a ransomware strain and then recruit &#8220;affiliates&#8221; who could deploy it against victims. The &#8220;affiliates&#8221; would steal sensitive data from victims and also encrypt the victim&#8217;s systems.&nbsp;<\/p>\n<p>After a victim paid the hackers to get their stolen data back &#8212; as well as a decryption key necessary to decrypt their system &#8212; the affiliates and Hive administrators would split the ransom 80\/20. If a victim didn&#8217;t pay, their data was published on the Hive Leak Site.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authorities have disrupted the Hive ransomware group by infiltrating its computer networks and capturing its decryption keys, saving victims over $100 million in ransom payments.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-50296","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DOJ takes down ransomware group with a &#039;21st century cyber stakeout&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DOJ takes down ransomware group with a &#039;21st century cyber stakeout&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-26T18:56:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DOJ takes down ransomware group with a &#8217;21st century cyber stakeout&#8217;\",\"datePublished\":\"2023-01-26T18:56:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/\"},\"wordCount\":332,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/\",\"name\":\"DOJ takes down ransomware group with a '21st century cyber stakeout' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-01-26T18:56:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#primaryimage\",\"url\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DOJ takes down ransomware group with a &#8217;21st century cyber stakeout&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DOJ takes down ransomware group with a '21st century cyber stakeout' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/","og_locale":"en_US","og_type":"article","og_title":"DOJ takes down ransomware group with a '21st century cyber stakeout' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-01-26T18:56:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DOJ takes down ransomware group with a &#8217;21st century cyber stakeout&#8217;","datePublished":"2023-01-26T18:56:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/"},"wordCount":332,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/","url":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/","name":"DOJ takes down ransomware group with a '21st century cyber stakeout' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280","datePublished":"2023-01-26T18:56:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5781a203af9c1ae8f279be040f83f2f416f7ce30\/2021\/09\/27\/11cf4ae8-38a8-4caa-8a94-b2652ec8bc61\/fbi-decision-to-withhold-kaseya-ransomware.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/doj-takes-down-ransomware-group-with-a-21st-century-cyber-stakeout\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"DOJ takes down ransomware group with a &#8217;21st century cyber stakeout&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50296"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50296\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}