The Federal Bureau of Investigation has seized RAMP (Russian Anonymous Marketplace), a dark web cybercrime forum that served as one of the last platforms where ransomware-as-a-service operations were openly promoted. The takedown represents a significant blow to the ransomware ecosystem’s infrastructure.

Seizure details

AttributeDetails
DateJanuary 28, 2026
Lead agencyFBI
Coordinating agenciesUS Attorney’s Office (S.D. Florida), DOJ CCIPS
Domains seizedTor hidden service, ramp4u[.]io (clearnet)
Platform users14,000+
Registration fee$500 or 2 months activity on other forums
Facilitated damagesHundreds of millions (estimated)

The seizure notice

Both the forum’s Tor site and clearnet domain now display FBI seizure banners. In characteristic trolling, the FBI included RAMP’s own slogan—“THE ONLY PLACE RANSOMWARE ALLOWED!”—alongside an image of Masha from the Russian children’s cartoon “Masha and the Bear,” winking.

ElementSignificance
RAMP slogan includedDeliberate mockery
Masha cartoon characterRussian cultural reference
Multi-agency logosInternational coordination
Seizure timestampEvidence of access

The reference is pointed: Masha is a mischievous young girl who creates chaos, suggesting the FBI views the forum operators similarly.

Why RAMP mattered

Origin story

RAMP launched in July 2021 following a pivotal moment in ransomware history. After the DarkSide attack on Colonial Pipeline caused gas shortages across the US East Coast, major Russian-speaking forums Exploit and XSS banned ransomware promotion to reduce law enforcement heat.

DateEvent
May 2021Colonial Pipeline attack causes US gas shortages
May 2021Exploit and XSS forums ban ransomware content
July 2021RAMP launches to fill the void
2021-2026RAMP becomes primary ransomware marketplace

RAMP filled the void, becoming the only major forum explicitly permitting ransomware-as-a-service activity.

Forum statistics

MetricValue
Total users14,000+
Entry requirement$500 fee OR 2 months activity elsewhere
Primary languageRussian
Operational periodJuly 2021 – January 2026
StatusSeized

Services offered

CategoryExamples
RaaS recruitmentAffiliate programs for major ransomware gangs
Initial accessCompromised VPN credentials, RDP access, corporate network footholds
MalwareInfostealers, loaders, custom tooling
Data tradingStolen databases, exfiltrated corporate data
Money launderingCryptocurrency mixing, cash-out services
Exploit salesZero-days and n-days

Notable ransomware operations on RAMP

GroupStatusNotable attacks
LockBitDisrupted Feb 2024, rebuildingThousands of victims globally
ALPHV/BlackCatExit scammed Dec 2023Change Healthcare ($22M ransom)
ContiDisbanded 2022Costa Rica government
QilinActiveHealthcare, critical infrastructure
DragonForceActiveVarious sectors
RansomHubActiveEnterprise targets

Operator background

Mikhail Matveev (“Wazawaka”)

One of RAMP’s operators was identified as Mikhail Matveev, a Russian national known by aliases including:

AliasContext
OrangeForum administrator handle
WazawakaHacking community identity
BorisElcinAlternative handle
StatusDetails
FBI Most WantedAdded 2023
ArrestRussia, 2024
ChargesRansomware conspiracy, computer fraud
ExtraditionUnlikely given Russia’s stance

Matveev was added to the FBI Most Wanted list and subsequently arrested in Russia in 2024. His identification marked the beginning of RAMP’s troubles.

”Stallman” responds

Following the seizure, an individual using the handle “Stallman” (another alleged RAMP operator) acknowledged the takedown on the XSS hacking forum:

“Law enforcement has gained control of RAMP. I will not create a new forum, but my core business remains unchanged. This event destroyed years of my work to create the most free forum in the world.”

The statement suggests the operator intends to continue criminal activity through other channels, likely private Telegram groups or invite-only forums.

Database leak

Shortly after the seizure announcement, screenshots from a suspected RAMP database leak appeared in a Telegram channel.

Leaked information

Data typeSignificance
User email addressesPotential identification of criminals
Private messagesIntelligence on criminal coordination
Transaction recordsEvidence for prosecution
Registration dataIdentity correlation
LockBit operator emailAllegedly used for forum registration

The LockBit email is particularly significant—if authentic, it could provide investigators with additional leads on one of the most prolific ransomware operations.

Intelligence value

ApplicationBenefit
Identity correlationLink pseudonyms to real identities
Criminal network mappingUnderstand relationships
Prosecution evidenceSupport indictments
Future investigationsLead generation
Victim notificationAlert compromised organizations

Ecosystem adaptation

With RAMP gone, ransomware operators have fewer centralized platforms. Observed and expected adaptations:

AdaptationStatus
Private Telegram channelsAlready in use
Rehub forumNova, DragonForce reportedly migrating
Invite-only forumsHigher barrier, harder to infiltrate
Direct recruitmentLeveraging existing networks
Decentralized marketsBlockchain-based alternatives emerging

Migration patterns

GroupReported destination
NovaRehub forum
DragonForceRehub forum
OthersPrivate Telegram channels

Impact assessment

Immediate effects

EffectStatus
RAMP marketplace offlineConfirmed
Criminal operations disruptedTemporary
User/transaction data seizedIntelligence windfall
Affiliate recruitment interruptedShort-term

Long-term implications

EffectLikelihoodTimeline
Arrests from seized dataHigh6 months
Prosecution of affiliatesModerate-high12-18 months
Ecosystem fragmentationHighOngoing
New forums emergingCertainAlready occurring
Increased OPSEC among criminalsCertainImmediate

Pattern of enforcement

The RAMP seizure continues an aggressive law enforcement campaign against ransomware infrastructure:

DateActionTarget
February 2024Operation CronosLockBit infrastructure
December 2023Exit scam pressureALPHV/BlackCat
2023-2024Multiple arrestsConti affiliates
January 2026SeizureRAMP forum

Each action forces criminals to rebuild infrastructure, recruit new affiliates, and establish new trust relationships—all of which create friction and intelligence opportunities.

Recommendations

For organizations

The RAMP seizure may lead to short-term behavioral changes:

RiskPreparation
Increased attacksCriminals may accelerate before potential arrest
New extortion tacticsAdaptation to infrastructure loss
Affiliate movementOperators joining different RaaS programs
Desperation attacksLess discriminate targeting

Defensive measures

ControlPurpose
Current, tested backupsSurvive ransomware encryption
Incident response plansReady for activation
Initial access monitoringDetect compromised credentials
Dark web monitoringTrack exposure and targeting
Employee awarenessPhishing and social engineering

For threat intelligence teams

ActionPurpose
Monitor TelegramTrack RAMP successor channels
Track forum discussionsEcosystem adaptation intelligence
Analyze leaked databaseIdentity correlation (if public)
Update IOC feedsRevealed infrastructure
Map affiliate migrationUnderstand new relationships

Context

RAMP’s seizure demonstrates that even forums operating exclusively on Tor can be taken down. The combination of OPSEC failures (Matveev identification), coordinated international pressure, and persistent investigation eventually compromises criminal infrastructure.

FactorOutcome
OPSEC failureOperator identified
International cooperationMulti-agency action
Persistent investigationYears of intelligence gathering
Legal toolsEffective seizure mechanisms

However, the ransomware ecosystem is resilient. New forums will emerge, recruitment will shift to more distributed channels, and criminal operations will continue. The value of takedowns lies in:

BenefitExplanation
Intelligence gatheredDatabase enables future investigations
Friction createdCriminals must rebuild
Occasional prosecutionSome operators face consequences
DeterrenceIncreased operational risk

The leaked database may prove more valuable than the seizure itself. If it contains authentic operator information, expect arrests and indictments in the coming months. The alleged LockBit operator email, if verified, could provide a significant break in one of the most impactful ransomware investigations.