The Embargo cyberattack group forced American companies to pay approximately $34.2 million in cryptocurrencies. It operates on a RaaS* model and primarily targets companies in the healthcare, business services and manufacturing sectors. In addition to financial gain, the hackers are likely pursuing political goals, as evidenced by their involvement in similar incidents.
* RaaS stands for Ransomware-as-a-Service – a cybercrime model in which the creators of malicious software (ransomware) offer their tool to other attackers in a similar way to how legal software companies provide software as a service.
Article content:
Who are the victims and what are the Embargo group’s revenues?
Since April 2024, the Embargo cyberattack group, which operates under the RaaS model, has obtained approximately $34.2 million in cryptocurrency from its victims.
These included American Associated Pharmacies, Memorial Hospital and Manor, and Weiser Memorial Hospital. Some ransom payments reached as much as $1.3 million.
Analysts believe that Embargo may be a rebranding or successor to the well-known BlackCat (ALPHV) group. The suspicions are based on technical similarities: the use of the Rust programming language, a similar website design for data leaks, and identical cryptocurrency wallet addresses.
The group provides tools to affiliated hackers in exchange for a share of the ransom, while retaining control over key operations – infrastructure and negotiations with victims. It avoids the aggressive publicity typical of other groups, which helps it stay out of the spotlight of law enforcement agencies for longer.

You may be interested in: PancakeSwap – Platform Review
What does an ‘attack’ look like in a nutshell – a few points to watch out for.
Embargo’s main targets are companies in the healthcare, business services and manufacturing sectors, particularly in the US, where organisations are usually able to pay higher ransoms.
Hackers gain access to networks through unpatched vulnerabilities, phishing or infected websites. They then disable security systems and delete backup copies before encrypting the data.
In addition, the Embargo group uses a ‘double extortion’ tactic – not only does it encrypt data, but it also steals confidential information and threatens to publish or sell it on the darknet. In some cases, the attackers even publish the names of specific individuals to increase the pressure.
The ransom money goes through intermediary wallets, high-risk exchanges, and even sanctioned platforms. Approximately $18.8 million is currently ‘frozen’ at unknown addresses, likely to make tracking more difficult.
Cyberspace experts believe that Embargo may be using artificial intelligence (AI) and machine learning to spread attacks, create realistic phishing messages, automatically modify malicious software, and speed up operations.
However, the same technologies are also used by companies for defence – from detecting unusual activity to automatically blocking suspicious processes.
How to protect your business from Embargo ransomware
Protecting your organisation from sophisticated ransomware groups such as Embargo requires a proactive, multi-layered approach. One of the most important steps is to keep all systems and software up to date and install security patches as soon as they are released. Many known breaches occur precisely because of unpatched vulnerabilities. Strengthening email security is equally important, as phishing remains a common entry point – use advanced filtering tools, sandbox attachments, and continuously train employees to recognise malicious emails.
Another pillar of protection is access control: enable multi-factor authentication for all accounts, especially administrative ones, and adhere to the principle of least privilege to limit damage in the event of an account compromise. Network segmentation, where critical systems are isolated, can prevent ransomware from spreading freely.
Reliable offline backups are also essential – store them in a secure, immutable format and test recovery regularly. Finally, invest in monitoring tools such as Endpoint Detection & Response (EDR) to detect unusual activity in a timely manner. Complement these steps with a well-thought-out incident response plan to minimise business disruption and financial losses in the event of an attack.
Embargo represents a new generation of highly effective ransomware operations – technically advanced, stealthy and financially very efficient. Their constantly evolving toolset and silent infrastructure make them a particularly dangerous cyber threat to the entire world.
