In a surprising turn of events, the Everest ransomware gang—a notorious Russia-linked cybercriminal organization—has suffered a significant setback. Over the weekend, their dark web leak site was hacked and defaced by an unknown attacker, leaving the site offline and inaccessible. The defacement replaced the gang’s usual extortion content with a sarcastic message reading: “Don’t do crime. CRIME IS BAD xoxo from Prague”.

The incident: A Rare Attack on Cybercriminals
Everest’s leak site, hosted on the Tor network, served as a critical tool in their double-extortion strategy. The gang would publish sensitive stolen data to pressure victims into paying hefty ransoms. However, this incident marks a rare instance of cybercriminals themselves being targeted. The attackers not only defaced the site but also rendered it unreachable, with visitors now encountering an “Onion site not found” error.
While details remain unclear about how the breach occurred, cybersecurity experts speculate that vulnerabilities in Everest’s infrastructure were exploited. Flare Senior Threat Intelligence Researcher Tammy Harper noted that Everest relied on a WordPress template for their blog, which may have been the weak link enabling the attack.
Who Are Everest?
Since its emergence in 2020, Everest has established itself as a formidable player in the ransomware landscape. Initially focused on corporate extortion through data theft, the group later incorporated ransomware attacks to encrypt victims’ systems. Beyond their direct operations, Everest acts as an Initial Access Broker (IAB), selling access to breached networks to other threat actors—a lucrative business model within the cybercrime ecosystem.
The gang has claimed responsibility for high-profile breaches targeting organizations like NASA, the Brazilian government, and STIIIZY, a California-based cannabis retailer. In these attacks, they have stolen sensitive data ranging from customer purchase information to government IDs. Their operations have also increasingly targeted healthcare organizations in the U.S., prompting warnings from federal agencies.
Implications of the Hack
This defacement highlights vulnerabilities even among sophisticated cybercriminal groups. While it remains uncertain whether the attackers accessed sensitive internal data or merely disrupted Everest’s operations, such incidents underscore the dynamic nature of cyber warfare. Criminal organizations are not immune to attacks themselves, whether from ethical hackers, rival groups, or law enforcement agencies.
The timing aligns with broader trends in ransomware activity. Although attacks have risen globally, victim payments dropped significantly during 2024 due to improved backup strategies and increased resistance to ransom demands. Law enforcement has also intensified efforts against ransomware gangs, successfully dismantling operations like LockBit and Radar.
What’s Next for Everest?
Cybersecurity experts caution that setbacks like these rarely spell the end for criminal groups. Everest could rebuild its infrastructure or rebrand under a new identity—a common tactic among ransomware gangs facing disruption. However, this incident serves as a reminder of the volatile nature of cybercrime and raises questions about vigilante justice in cyberspace.
As organizations worldwide continue to bolster defenses against ransomware threats, this attack on Everest highlights an ironic twist: even those who prey on vulnerabilities can fall victim to them.