Black Kingdom Admin Indicted

Summary

Rami Khaled Ahmed, a 36-year-old Yemeni national, has been indicted by U.S. authorities for developing and deploying the Black Kingdom ransomware. He targeted Microsoft Exchange servers, impacting approximately 1,500 computer systems globally. Ahmed faces up to five years for each of the three counts against him — conspiracy, intentional damage to a protected computer, and threatening damage to a protected computer.

Explore the data solution with built-in protection against ransomware TrueNAS.

** Main Story**

The United States Department of Justice (DOJ) has indicted Rami Khaled Ahmed, a 36-year-old Yemeni national, for his alleged role as the developer and primary operator of the Black Kingdom ransomware. The indictment, unsealed on May 1, 2025, accuses Ahmed of exploiting vulnerabilities in Microsoft Exchange servers to deploy the ransomware, affecting approximately 1,500 computer systems in the U.S. and internationally between March 2021 and June 2023.

The Black Kingdom Ransomware Campaign

Ahmed, also known as “Black Kingdom,” faces charges of conspiracy, intentional damage to a protected computer, and threatening damage to a protected computer. He allegedly demanded a $10,000 ransom in Bitcoin from each victim. The DOJ’s indictment details how Black Kingdom either encrypted data on the victims’ networks or claimed to have stolen it, leaving a ransom note instructing victims on how to pay the ransom via a cryptocurrency address controlled by a co-conspirator. Victims also had to send proof of payment to a designated Black Kingdom email address.

Targeting Microsoft Exchange Vulnerabilities

The Black Kingdom ransomware campaign specifically targeted a vulnerability in Microsoft Exchange known as ProxyLogon. This vulnerability, discovered in early 2021, allowed attackers to gain unauthorized access to Exchange servers and deploy web shells, which they then used to execute commands remotely. This exploitation enabled Ahmed to deploy the Black Kingdom ransomware across numerous organizations worldwide, including businesses, schools, and hospitals.

The DOJ identified several U.S.-based victims of the ransomware spree, including:

  • A medical billing services company in California
  • A ski resort in Oregon
  • A school district in Pennsylvania
  • A health clinic in Wisconsin

International Collaboration and Legal Challenges

The FBI, with assistance from the New Zealand Police, led the investigation into the Black Kingdom ransomware attacks. Although indicted, Ahmed remains at large and is believed to be residing in Yemen. As Yemen does not have an extradition treaty with the United States, apprehending and prosecuting Ahmed presents a significant challenge.

This case highlights the growing threat of ransomware and the increasing sophistication of cybercriminals. The exploitation of vulnerabilities like ProxyLogon underscores the importance of timely software patching and robust cybersecurity practices for individuals and organizations alike. While the indictment of Ahmed signifies a step towards accountability, the challenges in bringing him to justice highlight the complexities of international law enforcement in the digital age. If convicted on all three counts, Ahmed faces a maximum sentence of 15 years in federal prison.

Ransomware: A Growing Global Threat

Ransomware attacks continue to pose a substantial threat to businesses, governments, and individuals worldwide. These attacks typically involve encrypting an organization’s data or systems and demanding a ransom for their release. The increasing prevalence of ransomware attacks necessitates a multi-pronged approach involving:

  • Proactive Security Measures: Implementing robust cybersecurity practices, such as regular software updates, strong passwords, multi-factor authentication, and employee training, can significantly reduce the risk of ransomware attacks.
  • International Collaboration: As ransomware attacks often involve perpetrators and victims in different countries, international cooperation between law enforcement agencies is crucial for effective investigation and prosecution.
  • Public Awareness Campaigns: Educating the public about the risks of ransomware and best practices for prevention can help individuals and organizations protect themselves from these attacks.

The indictment of Rami Khaled Ahmed serves as a reminder of the seriousness of the ransomware threat and the importance of ongoing efforts to combat cybercrime. As cybercriminals continue to evolve their tactics and techniques, staying informed and adopting proactive security measures remains paramount for individuals and organizations to safeguard their data and systems from these malicious actors.

17 Comments

  1. Demanding $10,000 in Bitcoin *per victim*? Sounds like someone needs to diversify their portfolio! Any insights on what kind of security measures those targeted companies *didn’t* have in place? Asking for a friend who, uh, “collects” cybersecurity anecdotes.

    • Great point! Many targeted companies were indeed vulnerable due to unpatched Microsoft Exchange servers. The ProxyLogon vulnerability, in particular, allowed attackers to gain unauthorized access. Timely patching and robust security protocols are crucial for preventing such attacks. Interesting anecdotes your friend is collecting!

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  2. Given the challenges of extradition, what avenues, beyond direct prosecution, could be explored to hold individuals like Ahmed accountable for their actions in the international arena?

    • That’s a crucial question! Beyond extradition, focusing on international asset seizure and financial sanctions could be a powerful deterrent. Also, promoting international agreements on cybercrime and establishing joint task forces can help circumvent jurisdictional limitations. Public naming and shaming can also have an impact. It’s a multi-faceted problem requiring a multi-faceted response!

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  3. So, $10,000 in Bitcoin *per* victim, eh? I wonder if he offered a family discount for the school district? And if so, did they pay up? Just curious how that negotiation went down…

    • That’s a funny thought! I don’t know if there were any discounts for the school district, but it does raise an interesting question about how these ransoms are determined in the first place. Perhaps there are some established “market rates”? Anyone have insight into the economics of ransomware?

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  4. The targeting of schools and hospitals underscores the devastating real-world consequences of ransomware. I wonder, beyond financial losses, what the long-term impacts are on these institutions’ ability to provide essential services to their communities?

    • That’s a really important point. Beyond the immediate financial strain, the long-term impact on community services is a huge concern. It would be interesting to research the compounding effects ransomware has on the availability of services after an attack, and how that affects public trust.

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  5. The focus on ProxyLogon exploitation is critical. I’m interested in exploring the lag time between vulnerability discovery, patch availability, and widespread implementation across various sectors. What strategies could expedite patch adoption to minimize the window of opportunity for attackers like Ahmed?

    • Great point about the patch adoption lag! Exploring strategies to speed that up is key. Perhaps incentivizing updates through insurance benefits or establishing industry-wide update compliance standards could help. The gap between vulnerability disclosure and patching needs addressing across the board. What are your thoughts?

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  6. So, is “Black Kingdom” the *official* name on his business cards, or just a catchy pseudonym? And, realistically, how does one go about developing ransomware? Asking for a friend who’s, uh, writing a *fiction* novel.

    • That’s a great question! While “Black Kingdom” is more of an alias used in the indictment, the actual process of developing ransomware is quite complex. It involves a deep understanding of cryptography, network vulnerabilities, and coding skills. I guess your friend might find some insights from real-world examples, but ethical considerations are paramount!

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  7. So, if apprehended, would “Black Kingdom” Ahmed face charges *both* in the US *and* Yemen (if they had an extradition treaty)? Double jeopardy for digital deeds? And would that Bitcoin ransom be converted to USD at the time of the crime or conviction? Asking for a friend who’s writing… well, you know.

    • That’s an interesting question. If Yemen had an extradition treaty with the US, the legal implications could become quite complex, especially regarding the timing of Bitcoin’s conversion to USD for valuation purposes, and the question of double jeopardy. I wonder how similar cases have been handled in the past!

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  8. The collaboration between the FBI and the New Zealand Police highlights the importance of international cooperation in tackling cybercrime. What other nations are actively involved in these joint cybercrime task forces, and what specific expertise do they bring to the table?

    • That’s a great question! It truly underscores how vital these international partnerships are. Beyond the FBI and New Zealand Police, nations like the UK, Canada, and Australia have also been actively participating. Each brings unique capabilities like digital forensics, intelligence gathering, and legal frameworks to the table, creating a more comprehensive defense.

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  9. Given that the ransom was demanded in Bitcoin, what methods are typically employed to trace cryptocurrency transactions in these types of international cybercrime investigations, especially across jurisdictions with varying regulations?

Comments are closed.