Skip to main content
Contact
API
logo DNN
 logo

Main

News Markets Investigations Arrests Guides Forums Services

FBI Shuts Down RAMP Cybercrime Forum Tied to Ransomware Gangs

FBI Shuts Down RAMP Cybercrime Forum Tied to Ransomware Gangs
January 29, 2026

The FBI has taken control of RAMP, a major underground forum used by cybercriminals to trade malware, stolen data, and access to compromised networks. Law enforcement executed a coordinated operation that seized the forum’s servers and replaced the site with a seizure notice, disrupting a central hub where ransomware operators and other threat actors coordinated attacks and bought services.


RAMP operated as a full-service marketplace for cybercrime. Actors used it to advertise ransomware-as-a-service offerings, sell initial access to breached corporate networks, trade malware builders, and exchange stolen credentials and data. The forum’s structure and features made it easy for both experienced operators and newcomers to find tools, hire affiliates, and purchase illicit access.


DNN’s review of law enforcement statements, the seizure followed an investigation that traced forum infrastructure and financial trails tied to operators facilitating ransomware campaigns. Authorities worked with international partners to identify key servers and accounts used to run the site. Once seized, the forum was taken offline and replaced with a banner indicating the FBI’s action.


Security researchers welcomed the disruption, saying RAMP’s removal complicates coordination for many ransomware groups and raises the cost and effort of finding alternative marketplaces. However, analysts cautioned that the broader cybercrime ecosystem is adaptable: participants often migrate to other forums, encrypted messaging platforms, or invite-only marketplaces.


The RAMP takedown is part of a broader trend of sustained pressure from law enforcement against cybercriminal marketplaces. Recent years have seen multiple seizures and arrests targeting platforms that support ransomware and other online fraud. While these disruptions don’t eliminate the threat, they aim to fragment criminal networks and reduce the ease with which malicious actors obtain tools and access.

DNN will continue tracking developments tied to the RAMP seizure, including any arrests, indictments, or shifts in where ransomware gangs recruit and trade. Security teams and organizations should use the disruption as a reminder to strengthen defenses: patch exposed services, monitor for unusual access, and vet third-party credentials to reduce the risk of intrusion.

← Back to News