Royal
Royal is a private ransomware group composed of former Conti operators that rapidly became one of the most prolific ransomware threats in late 2022. Known for targeting critical infrastructure — including healthcare, government, and manufacturing — with double extortion tactics, Royal rebranded as BlackSuit in mid-2023 and was ultimately disrupted by international law enforcement in July 2025.
Overview
Royal is a financially motivated ransomware group that first appeared in January 2022 under the name Zeon. The group rebranded to Royal in September 2022 and quickly became one of the most prolific ransomware operations in the threat landscape, ranking behind only LockBit and BlackCat by the end of that year. Royal is composed of experienced operators believed to be former members of the now-disbanded Conti ransomware syndicate, which itself had ties to the TrickBot and Ryuk malware ecosystems.
Unlike many ransomware operations that rely on affiliate models (Ransomware-as-a-Service), Royal operated as a private, closed group with no known affiliates. The group maintained tight control over its custom encryption tools and infrastructure. Royal used a double extortion model: encrypting victim data while simultaneously exfiltrating sensitive files and threatening to publish them on a leak site if ransom demands were not met. Ransom demands ranged from $250,000 to over $2 million during the Royal era.
In mid-2023, following the high-profile attack on the City of Dallas, Royal began testing a new encryptor called BlackSuit. By late 2023, the group had fully rebranded under the BlackSuit name, likely to evade law enforcement scrutiny. Under the combined Royal and BlackSuit banners, the operation compromised more than 450 organizations and collected over $370 million in ransom payments. On July 24, 2025, international law enforcement executed Operation Checkmate, seizing BlackSuit's infrastructure, domains, and cryptocurrency assets. Authorities have since linked the group's leadership to Russian national Oleg Evgenievich Nefedov, who is now on Europol and Interpol most-wanted lists. Researchers have assessed with moderate confidence that former BlackSuit members may have regrouped under the Chaos ransomware banner.
Target Profile
Royal aggressively targeted a broad range of industries and critical infrastructure sectors. The group showed no hesitation in attacking healthcare and public safety organizations, which prompted the U.S. Department of Health and Human Services (HHS) to issue a dedicated advisory in December 2022. The United States accounted for roughly 63% of all observed Royal targeting activity, with Canada, Germany, Australia, and Brazil rounding out the top five targeted countries. The majority of victim organizations were small to mid-sized businesses, though several large enterprises and municipal governments were also hit.
- Healthcare: Hospitals, medical service providers, and plasma donation centers were consistently targeted. The group compromised organizations such as Northwest Michigan Health Services and later (as BlackSuit) Octapharma Plasma, which shuttered nearly 200 donation centers.
- Government & Critical Infrastructure: Municipal governments including the City of Dallas were heavily impacted. Royal also targeted chemical, communications, defense industrial base, dam, nuclear, and emergency services sectors according to CISA advisories.
- Manufacturing & IT: Manufacturing and technology companies represented a large share of victims, likely due to broad attack surfaces involving specialized equipment and managed software.
- Finance & Education: Financial services firms and educational institutions — including school districts — were frequently targeted, particularly after the rebrand to BlackSuit.
- Automotive (via BlackSuit): The CDK Global attack in June 2024 disrupted approximately 15,000 auto dealerships across North America, causing an estimated $1 billion in collective losses.
Tactics, Techniques & Procedures
Royal employed a mature and adaptable set of TTPs drawn from the collective experience of its Conti-era operators. The group combined social engineering for initial access with living-off-the-land techniques for lateral movement and defense evasion. Key TTPs documented by CISA, FBI, and MITRE ATT&CK (Software S1073) are summarized below.
| mitre id | technique | description |
|---|---|---|
| T1566 | Phishing | Primary initial access vector. Royal used callback phishing (fake subscription renewal emails with phone numbers) and spear-phishing with malicious attachments. Victims were social-engineered into installing remote desktop software. |
| T1078.002 | Valid Accounts: Domain Accounts | Royal leveraged stolen domain service account credentials and VPN credentials harvested from stealer logs by initial access brokers to gain persistent network access. |
| T1059.012 | Command and Scripting Interpreter: Hypervisor CLI | Used esxcli commands to enumerate and terminate running virtual machines on ESXi hosts prior to encrypting VM disk files. |
| T1486 | Data Encrypted for Impact | Royal's custom ransomware uses AES-256 encryption via OpenSSL with multi-threaded partial encryption. A configurable percentage parameter (-ep) allows selective encryption of file contents, speeding the process and evading detection. |
| T1490 | Inhibit System Recovery | Deleted Volume Shadow Copies using vssadmin.exe with the command "delete shadows /all /quiet" to prevent victims from restoring encrypted files. |
| T1021.002 | Remote Services: SMB/Windows Admin Shares | Used SMB connections, RDP, and PsExec for lateral movement across compromised networks. Batch scripts were deployed via encrypted 7zip archives to propagate the ransomware. |
| T1046 | Network Service Discovery | Used NetScan and ADFind to enumerate network shares, connected devices, domain members, and group memberships for reconnaissance. |
| T1489 | Service Stop | Used RmShutDown and batch scripts to kill security-related services and applications that held locks on files targeted for encryption. |
| T1070.001 | Indicator Removal: Clear Windows Event Logs | Batch files deleted Application, System, and Security event logs after encryption to hinder forensic investigation. |
| T1082 | System Information Discovery | Used GetNativeSystemInfo and other Windows APIs to enumerate system processors, IP addresses, and logical drives before encryption. |
Known Campaigns
Royal was involved in numerous high-profile attacks across critical infrastructure sectors. The following are confirmed or highly attributed operations linked to this threat actor and its BlackSuit successor.
Royal gained initial access to Dallas city systems on April 7, 2023 using stolen domain service account credentials. Over nearly a month of dwell time, the group conducted reconnaissance, deployed Cobalt Strike beacons, and exfiltrated 1.169 TB of data. On May 3, Royal began encrypting prioritized servers, crippling police communications, 911 dispatch systems, municipal courts, and public-facing websites. The city allocated $8.5 million for recovery. Personal data of over 30,000 individuals was exposed.
Royal successfully attacked the Silverstone Formula One circuit and publicly announced the compromise on their leak site. The full extent of data exfiltration was not publicly disclosed.
Royal claimed the compromise of INTRADO, an American telecommunications company with more than 10,000 employees. The group reported exfiltrating internal documents, passports, and employee identification records.
Operating under the BlackSuit rebrand, the group attacked CDK Global, a software provider serving approximately 15,000 auto dealerships across North America. The attack encrypted critical systems and caused an estimated $1 billion in collective losses to dealerships. CDK reportedly paid a $25 million Bitcoin ransom. This was the third-largest ransomware payment publicly observed at the time.
BlackSuit targeted Octapharma Plasma, a blood plasma collection organization operating in over 100 countries. The attack resulted in the temporary shutdown of nearly 200 blood plasma donation centers across 35 U.S. states, achieved by targeting ESXi systems with the Linux variant of the ransomware.
International law enforcement agencies from nine countries executed a coordinated takedown of BlackSuit infrastructure under Operation Checkmate, a Europol J-CAT initiative. Authorities seized four servers, nine domains, and over $1 million in cryptocurrency. The operation confirmed over 450 U.S. victims and $370 million in total ransom payments across the Royal and BlackSuit era. Suspected leader Oleg Evgenievich Nefedov was added to Europol and Interpol most-wanted lists.
Tools & Malware
Royal used a combination of custom ransomware payloads and widely available legitimate tools to conduct operations. The reliance on living-off-the-land binaries and open-source utilities made detection more challenging.
- Royal Ransomware (S1073): Custom-built ransomware for Windows and ESXi/Linux. Uses AES-256 encryption via OpenSSL with configurable partial encryption. Appends the ".royal" extension to encrypted files and drops a README.txt ransom note directing victims to a Tor-based negotiation portal.
- Zeon: The predecessor encryptor used before the group rebranded from Zeon to Royal in September 2022. Shared encryption methodologies with BlackCat.
- BlackSuit Ransomware: Direct successor to Royal with nearly identical code. Emerged in May 2023 and became the group's primary encryptor after the rebrand. Extended capabilities and improved encryption speed.
- Cobalt Strike: Used extensively as a post-exploitation framework for command-and-control, lateral movement, and payload delivery. Beacons were frequently deployed across victim networks during the dwell period.
- BATLOADER: Initial access malware spread through SEO poisoning and malicious Google Ads. Disguised as legitimate software downloads (such as Zoom or Microsoft Teams), it served as a dropper for Cobalt Strike beacons.
- QakBot: Banking trojan repurposed as a delivery mechanism for Royal ransomware payloads in certain campaigns.
- NetScan: Legitimate open-source network discovery tool used for enumerating network shares, connected devices, and mapping target environments.
- ADFind: Active Directory enumeration tool used to identify domain members, group memberships, and organizational structure.
- PsExec: Microsoft Sysinternals tool used for lateral movement and remote execution of ransomware binaries across networked hosts.
- PowerTool / Process Hacker / GMER / NSudo: Kernel-level utilities used to disable or uninstall endpoint protection software before ransomware deployment.
- Chisel / PuTTY / OpenSSH / MobaXterm: Tunneling and remote access tools used to maintain communication with command-and-control infrastructure.
- MegaCMD / SharpExfiltrate: Tools used for staging and exfiltrating victim data prior to encryption.
Indicators of Compromise
Select publicly available IOCs from FBI and CISA joint advisory AA23-061A. The full advisory contains extensive IOC tables (Tables 1-15) spanning both the Royal and BlackSuit eras. Verify currency before operational use.
Many Royal/BlackSuit IOCs date back to 2022-2024 and may be stale or repurposed for legitimate use. FBI and CISA recommend vetting all IP addresses before taking blocking action. Always cross-reference with live threat intel feeds.
Mitigation & Defense
Recommended defensive measures based on CISA, FBI, and industry guidance for organizations that may fall within this actor's target profile. While Royal is defunct, the same operators continue under successor brands and employ identical techniques.
- Phishing Defenses: Implement advanced email filtering, DMARC/DKIM/SPF, and user awareness training focused on callback phishing schemes. Royal's primary initial access vector was social engineering via fake subscription renewal emails.
- Credential Hygiene: Enforce multi-factor authentication on all accounts, especially domain admin and VPN accounts. Royal frequently used stolen credentials and stealer log data from initial access brokers.
- Network Segmentation: Segment networks to limit lateral movement. Royal relied heavily on SMB, RDP, and PsExec to traverse flat networks. Microsegmentation can contain an intrusion to the initial compromised segment.
- Endpoint Detection and Response (EDR): Deploy and maintain EDR solutions with tamper protection. Royal operators used kernel-level tools (PowerTool, Process Hacker, GMER) to disable or uninstall security software before encryption.
- Backup and Recovery: Maintain offline, immutable backups. Royal deleted Volume Shadow Copies and event logs to inhibit recovery. Regularly test backup restoration procedures in isolation.
- Monitoring for Cobalt Strike: Configure alerts for Cobalt Strike beacon activity, unusual PsExec service installations (event IDs 7045/7036), and anomalous lateral movement patterns.
- Patch Management: Keep all internet-facing devices and ESXi servers patched. Royal expanded its arsenal to include a Linux variant targeting ESXi environments, which can devastate virtualized data centers.
- Zero Trust Architecture: Adopt a Zero Trust approach requiring authentication for every request and strictly limiting access privileges to reduce the blast radius of a compromised account.
Although Royal's infrastructure was seized in July 2025 under Operation Checkmate, researchers assess with moderate confidence that former members have regrouped under the Chaos ransomware banner. Organizations should continue monitoring for TTPs consistent with Royal/BlackSuit operations, as the threat actors remain at large. The full CISA advisory (AA23-061A) contains extensive IOC tables, YARA rules, and detection signatures for both Royal and BlackSuit activity.
Sources & Further Reading
Attribution and references used to build this profile.
- CISA/FBI — #StopRansomware: BlackSuit (Royal) Ransomware, Advisory AA23-061A (Updated August 2024)
- MITRE ATT&CK — Royal Ransomware, Software S1073
- Palo Alto Unit 42 — Threat Assessment: Royal Ransomware (2023)
- Trend Micro — Ransomware Spotlight: Royal (2023)
- Kroll — Royal Ransomware Analysis (2023)
- SOCRadar — Dark Web Profile: Royal Ransomware (2024)
- Barracuda — BlackSuit Ransomware: 8 Years, 6 Names, 1 Cybercrime Syndicate (2024)
- City of Dallas — Ransomware Incident After-Action Report (September 2023)
- CyberScoop — BlackSuit, Royal Ransomware Group Hit Over 450 US Victims Before Takedown (August 2025)
- IST — Law Enforcement Strikes BlackSuit (Royal) Ransomware, Seizing Funds and Infrastructure (August 2025)