Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Cybertech Weekly: Top Highlights You Can’t Miss!

February 21, 2026

Build a Proactive Defense with Microsoft Security Exposure Management

February 20, 2026

New Tool: Attackers Exploit React2Shell Vulnerabilities

February 20, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » FBI Uncovers $2.4M Bitcoin Haul from Chaos Ransomware
Cybercrime and Ransomware

FBI Uncovers $2.4M Bitcoin Haul from Chaos Ransomware

Staff WriterBy Staff WriterJuly 29, 2025No Comments4 Mins Read2 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Summary Points

  1. FBI Seizure: The FBI seized approximately 20.29 Bitcoins (valued over $2.3 million) on April 15, 2025, from a cryptocurrency address linked to "Hors," a member of the Chaos ransomware group involved in cyberattacks on Texas companies.

  2. Civil Forfeiture Action: On July 24, 2025, the U.S. Department of Justice filed a civil complaint to formally forfeit the seized Bitcoin, utilizing civil forfeiture laws against assets connected to criminal activity.

  3. Chaos Ransomware Evolution: The Chaos ransomware operation is a rebrand of the BlackSuit group and is linked to members of the defunct Conti ransomware gang, which dissolved following law enforcement pressure in 2022.

  4. Investigative Connections: Cisco Talos researchers identified similarities between Chaos and BlackSuit ransomware, suggesting that recent law enforcement actions against BlackSuit’s dark web operations may have led to the identification of the cryptocurrency wallet linked to the seizure.

Underlying Problem

On April 15, 2025, the FBI’s Dallas office executed a significant seizure of approximately 20 Bitcoin, valued at over $2.3 million, linked to a member of the Chaos ransomware group, identified as “Hors.” This cryptocurrency was traced to a wallet employed in cyberattacks targeting various companies across Texas, a region particularly vulnerable to ransomware extortion tactics. The FBI’s announcement elucidates the ongoing struggles against these sophisticated cybercriminal enterprises, which have evolved from previous factions like the notorious Conti ransomware gang.

In a subsequent development, the U.S. Department of Justice filed a civil complaint on July 24, 2025, aiming to secure permanent forfeiture of the seized Bitcoin, an action made possible through civil forfeiture laws. These regulations allow the government to reclaim assets deemed connected to criminal activity, echoing a broader crackdown on ransomware operations that have proliferated following the disbanding and rebranding of previous groups like BlackSuit. As law enforcement stakes claim to these funds, the ongoing battle against ransomware underscores both the severity of the cyber threat landscape and the relentless efforts to hold criminals accountable within this shadowy realm of digital extortion.

Critical Concerns

The seizure of 20 Bitcoins from the Chaos ransomware group, particularly linked to its affiliate “Hors,” exposes a significant ripple effect that resonates deeply through the economy, placing other businesses, users, and organizations at heightened risk. This illicit operation not only threatens the immediate victims—Texas companies who faced extortion—but also instills a pervasive climate of anxiety among enterprises reliant on digital infrastructures. The ramifications are manifold: heightened cybersecurity measures may inflate operational costs for innocent businesses, while users face potential data breaches and financial losses as collateral damage in a war against proliferating cyber threats. Moreover, the rebranding of impending ransomware groups like Chaos underscores an adaptive threat landscape where attackers continuously refine their strategies, escalating the urgency for all organizations to fortify defenses and collaborate in combating these persistent, evolving risks. Consequently, even businesses not directly targeted can experience reputational harm and financial fallout as they strive to navigate an increasingly perilous digital ecosystem.

Fix & Mitigation

As cyber threats evolve, prompt remediation becomes paramount, particularly in the context of significant financial seizures linked to emerging ransomware threats.

Mitigation Steps

  • Incident Response Plan
  • Regular Backup Implementation
  • Employee Training Programs
  • Network Segmentation
  • Vulnerability Assessments
  • Multi-Factor Authentication

NIST CSF Guidance
The NIST Cybersecurity Framework underscores the necessity of proactive measures and response mechanisms to address ransomware threats. For detailed guidelines, refer to NIST SP 800-61, which emphasizes incident management strategies.

Advance Your Cyber Knowledge

Explore career growth and education via Careers & Learning, or dive into Compliance essentials.

Explore engineering-led approaches to digital security at IEEE Cybersecurity.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update Cybersecurity MX1
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRapid7 Achieves FedRAMP Authorization for InsightGovCloud Platform
Next Article IonQ Appoints Marco Pistoia as SVP of Industry Relations
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Build a Proactive Defense with Microsoft Security Exposure Management

February 20, 2026

Identity Gaps Fuel 90% of Major Cyber Incidents Amid AI-Driven Attacks

February 20, 2026

PayPal Data Breach: SSNs and Business PII Exposed for Over Six Months

February 20, 2026

Comments are closed.

Latest Posts

Identity Gaps Fuel 90% of Major Cyber Incidents Amid AI-Driven Attacks

February 20, 2026

PayPal Data Breach: SSNs and Business PII Exposed for Over Six Months

February 20, 2026

EU Unveils ICT Supply Chain Security Toolbox to Strengthen Risk Assessment and Defense

February 20, 2026

AI-Driven Cybersecurity: 2025’s Key Events & Emerging Trends

February 20, 2026
Don't Miss

Build a Proactive Defense with Microsoft Security Exposure Management

By Staff WriterFebruary 20, 2026

Exposure Management Framework: A new guide outlines a maturity-based approach to expose management, helping organizations…

Identity Gaps Fuel 90% of Major Cyber Incidents Amid AI-Driven Attacks

February 20, 2026

PayPal Data Breach: SSNs and Business PII Exposed for Over Six Months

February 20, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Cybertech Weekly: Top Highlights You Can’t Miss!
  • Build a Proactive Defense with Microsoft Security Exposure Management
  • New Tool: Attackers Exploit React2Shell Vulnerabilities
  • Mississippi Hospital System Shuts Down Clinics Following Ransomware Attack
  • Identity Gaps Fuel 90% of Major Cyber Incidents Amid AI-Driven Attacks
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Cybertech Weekly: Top Highlights You Can’t Miss!

February 21, 2026

Build a Proactive Defense with Microsoft Security Exposure Management

February 20, 2026

New Tool: Attackers Exploit React2Shell Vulnerabilities

February 20, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

BlinkOps Raises $50 Million Series B to Define New Category

July 29, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.