Loading...

Ransomfeed

Profilo, status e statistiche (dal 12-01-2020)

Dettaglio cyber gang

Profilo gang by OSINT sources: [source: 0]

Alerts:


Statistiche
N. rivendicazioni 2024 2023 2022
0 0 0 0
URLs
Fonte onionUltimo titoloStatusUltimo scrapeVersione Tor
dgnh6p5uq234zry7qx7bh73hj5ht3jqisgfet6s7j7uyas5i46xfdkyd.onion The Chat 🔴 10-11-2022 3
Materiale utile
URL ricerca source: 0
https://blogs.blackberry.com/en/2020/12/mountlocker-ransomware-as-a-service-offers-double-extortion-capabilities-to-affiliates
https://blogs.blackberry.com/en/2021/11/zebra2104
https://chuongdong.com/reverse%20engineering/2021/05/23/MountLockerRansomware/
https://community.riskiq.com/article/47766fbd
https://dissectingmalwa.re/between-a-rock-and-a-hard-place-exploring-mount-locker-ransomware.html
https://docs.google.com/spreadsheets/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3
https://github.com/Finch4/Malware-Analysis-Reports/tree/main/MountLocker
https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf
https://intel471.com/blog/how-cybercriminals-create-turbulence-for-the-transportation-industry
https://kienmanowar.wordpress.com/2021/08/04/quicknote-mountlocker-some-pseudo-code-snippets/
https://news.sophos.com/en-us/2021/03/31/sophos-mtr-in-real-time-what-is-astro-locker-team/
https://noticeofpleadings.com/crackedcobaltstrike/files/ComplaintAndSummons/1%20-Microsoft%20Cobalt%20Strike%20-%20Complaint(907040021.9).pdf
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE54L7v
https://securityintelligence.com/posts/itg23-crypters-cooperation-between-cybercriminal-groups/
https://securityintelligence.com/posts/trickbot-conti-crypters-where-are-they-now/
https://securityscorecard.pathfactory.com/research/quantum-ransomware
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-virtual-machines
https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/
https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/
https://thedfirreport.com/2023/04/03/malicious-iso-file-leads-to-domain-wide-ransomware/
https://www.bleepingcomputer.com/news/security/biotech-research-firm-miltenyi-biotec-hit-by-ransomware-data-leaked/
https://www.bleepingcomputer.com/news/security/mount-locker-ransomware-joins-the-multi-million-dollar-ransom-game/
https://www.bleepingcomputer.com/news/security/mount-locker-ransomware-now-targets-your-turbotax-tax-returns/
https://www.crowdstrike.com/blog/prophet-spider-exploits-oracle-weblogic-to-facilitate-ransomware-activity/
https://www.cybereason.com/blog/cybereason-vs.-quantum-locker-ransomware
https://www.guidepointsecurity.com/mount-locker-ransomware-steps-up-counter-ir-capabilities/
https://www.intezer.com/blog/malware-analysis/how-threat-actors-abuse-lnk-files/
https://www.microsoft.com/en-us/security/blog/2022/10/25/dev-0832-vice-society-opportunistic-ransomware-campaigns-impacting-us-education-sector/
https://www.trendmicro.com/en_us/research/21/j/ransomware-operators-found-using-new-franchise-business-model.html
Note di riscatto

Questo script colleziona ogni rivendicazione criminale esattamente come esposta dalle fonti (modello "As Is"), in un database SQL per creare un feed permanente, che può anche essere seguito con tecnologia RSS.
Il motore è basato sul progetto ransomFeed, fork in GitHub.