本サイトは、快適にご利用いただくためにクッキー(Cookie)を使用しております。
Cookieの使用に同意いただける場合は「同意する」ボタンを押してください。
なお本サイトのCookie使用については、「個人情報保護方針」をご覧ください。

最新情報

2023.02.01

ランサムウェア/攻撃グループの変遷と繋がり (Rev.2) 【更新: 2025年2月14日】

本図は世界で確認されてきた主なランサムウェア攻撃グループ(※1)のうち、「リブランド」を軸とした複合的視点による組織間の繋がりを図示したものである(※2)。

本Rev.2は、2022年5月に公開し好評を頂いたRev. 1から、日々移り変わる様々な観点の関連情報を多数追加し大きくアップデートした更新版となる。現在までに確認されてきたランサムウェア攻撃グループに関するあらゆる繋がりを可能な限り盛り込んだ。

本図から、ランサムウェア攻撃グループの多くがお互いに何からの関連性を持ち活動している背景が浮かび上がる。CONTIやBABUKをはじめソースコードの流出やグループの解散/テイクダウンなどの影響が他の新種出現へ顕著に繋がる流れが見て取れる。一方、NIGHT SKYなどのように、周辺グループとの繋がりから特定国に帰属する攻撃者像が浮き上がってくるケースもある。全体を通して見え隠れするアフィリエイトの共通性などから、ランサムウェア攻撃グループの表面的な組織数とは裏腹に、背後にいる攻撃者らの絶対数は一般に想像されるよりも少ない可能性などもここから推測できるだろう。

本図では、暴露活動の有無や活動拠点の概要なども一覧で把握できるようにしており、攻撃グループ名の索引も付録として添えているため、インシデント発生時の情報収集用途など辞書的な使い方としても是非活用してほしい。

(※1)  暴露型や話題性の高いグループを選抜。攻撃グループが使用するランサムウェアの名称も一部含む。
(※2)  MBSDの独自調査の他、世界各国の様々なセキュリティーベンダーの公開/発信情報を元に作成。
(Rev.1:2022年5月下旬作成)
(Rev.2:2023年2月上旬作成)

(日本語版) 最新版のダウンロードはこちら▼
MBSD_RansomwareMap_JP_Rev2.21.pdf
(印刷する場合はA3以上を推奨)

(English version) Please click to download latest version▼
MBSD_RansomwareMap_EN_Rev2.21.pdf
(Recommend to print on A3 or larger size.)




Rev.2のマイナーバージョンアップに関する更新履歴については以下の通り。
マイナーバージョン更新履歴主な更新箇所更新日付
2.00・初期バージョン一般公開2023/2/2
2.01・HELLO KITTYのスペル修正 ・LAPSUS$のコメント修正 ・その他、細部の変更 ・英語版の追加 ・NEVADAの新規追加2023/2/7
2.02・VEGA、DARKBIT に関する情報追加 ・MEDUSAの情報変更 ・NEVADAの情報変更 ・ZEPPELINの情報変更2023/2/16
2.03・CONTI、QUANTUM間の補助線にコメント追加 ・その他、細部の変更 ・HARDBITの新規追加 ・V IS VENDETTAの新規追加2023/3/6
2.04・MEOWのコメントを追加 ・MONTIとDONUTとの関係性を追加 ・BLACKSNAKEの新規追加 ・DARK POWERの新規追加 ・SNAPMCの新規追加 ・SZ40の新規追加 ・BLOODYの情報変更2023/3/20
2.05・ABYSSの新規追加 ・CATB(CATB99,BAXTOY)の新規追加 ・BLOODYの情報変更 ・STORMOUSの情報変更2023/3/28
2.06・AKIRAの新規追加 ・BADLOCK(RORSCHACH)の新規追加 ・CIPHERLOCKERの新規追加 ・DUNGHILLの新規追加 ・TRIGONAの新規追加2023/4/25
2.07・AKIRAの新規追加 ・BLACKBITの新規追加 ・BLACKSUITの新規追加 ・CACTUSの新規追加 ・ELBIEの新規追加 ・LOKI LOCKERの新規追加 ・RA GROUPの新規追加2023/5/12
2.08・8BASEの新規追加 ・CYCLOPSの新規追加 ・DARKRACEの新規追加 ・ESXIARGSの新規追加 ・LA PIOVRAの新規追加 ・MALASのの新規追加 ・NEBULAの新規追加 ・NOESCAPEの新規追加 ・RHYSIDAの新規追加 ・SHADOWの新規追加 ・BADLOCKの情報変更 ・BLACKSUITの情報変更 ・BLOODYの情報変更 ・CL0P (CLOP)の情報変更 ・NEVADAの情報変更 ・NOKOYAWAの情報変更 ・ROYALのの情報変更 ・SNATCHの情報変更2023/6/16
2.09・BIG HEADの新規追加 ・INC RANSOMの新規追加 ・KNIGHTの新規追加 ・METAENCRYPTORの新規追加 ・8BASEの情報変更 ・AVADDONの情報変更 ・BLACKSUITの情報変更 ・CACTUSの情報変更 ・CHILE LOCKERの情報変更 ・CYCLOPSの情報変更 ・NOESCAPEの情報変更 ・RHYSIDAの情報変更 ・ROYALの情報変更 ・SNATCHの情報変更2023/8/21
2.10・ShadowSyndicateに関する項目を新規追加 ・ランサムウェア攻撃グループのアクティブ状況を再定義 ・CIPHBITの新規追加 ・CLOAKの新規追加 ・CRYPTBBの新規追加 ・CRYPTNETの新規追加 ・GOOD DAYの新規追加 ・LOSTTRUSTの新規追加 ・RANCOZの新規追加 ・RANSOMED.VCの新規追加 ・THREEAM (3AM)の新規追加 ・ALPHV (BLACKCAT)の情報変更 ・BIANLIANの情報変更 ・CACTUSの情報変更 ・CL0P (CLOP)の情報変更 ・DARKSIDEの情報変更 ・EVERESTの情報変更 ・LOCKBIT3.0の情報変更 ・METAENCRYPTORの情報変更 ・NOKOYAWAの情報変更 ・PLAYの情報変更 ・QUANTUMの情報変更 ・ROYALの情報変更2023/10/4
2.11・CONTIの情報変更 ・RYUKの情報変更 ・ShadowSyndicateの情報変更2023/10/4
2.12・DEATHRANSOMの情報追加 ・LOCKERGOGAの情報追加 ・アフィリエイト(Wazawaka、他)に関する項目を追加 ・ハッカーグループ編成(Five Families)に関する項目を追加 ・プリカーサーマルウェア(QBOT)に関する項目を追加 ・DRAGONFORCEの新規追加 ・GHOSTSECの新規追加 ・HUNTERS INTERNATIONALの新規追加 ・LAMBDAの新規追加 ・MADCATの新規追加 ・MALEKTEAMの新規追加 ・MEGACORTEXの新規追加 ・RANSOEMCORPの新規追加 ・RAZNATOVICの新規追加 ・SAMSAMの新規追加 ・SIEGEDSECの新規追加 ・SPARTACUSの新規追加 ・WEREWOLVESの新規追加 ・ABYSSの情報変更 ・ALPHV (BLACKCAT)の情報変更 ・BABUKの情報変更 ・BIANLIANの情報変更 ・BLACKBASTAの情報変更 ・CACTUSの情報変更 ・CERBERの情報変更 ・CONTIの情報変更 ・CYCLOPSの情報変更 ・DHARMAの情報変更 ・EGREGORの情報変更 ・HELLO KITTY (FIVE HANDS)の情報変更 ・HIVEの情報変更 ・KNIGHTの情報変更 ・LOCKBIT2.0の情報変更 ・LOCKBIT3.0の情報変更 ・MARIOの情報変更 ・MEOWの情報変更 ・MONTIの情報変更 ・NOESCAPEの情報変更 ・NOKOYAWAの情報変更 ・PROLOCKの情報変更 ・PWNDLOCKERの情報変更 ・QILIN (AGENDA)の情報変更 ・RAGNAR LOCKERの情報変更 ・RANSOMED.VCの情報変更 ・REVIL (SODINOKIBI)の情報変更 ・STORMOUSの情報変更 ・TRIGONAの情報変更 ・WHITERABBITの情報変更2023/12/26
2.20・ALPHA (MYDATA)の新規追加 ・APOS SECURITYの新規追加 ・APT73 (ERALEIG)の新規追加 ・ARCUS MEDIAの新規追加 ・BLACKOUTの新規追加 ・BUHTIの新規追加 ・CROSSLOCKの新規追加 ・DAN0N (DANON)の新規追加 ・DARK VAULTの新規追加 ・DISPOSSESSORの新規追加 ・DONEXの新規追加 ・EL DORADOの新規追加 ・EMBARGOの新規追加 ・FAUSTの新規追加 ・FSOCIETY / FLOCKERの新規追加 ・GOING INSANEの新規追加 ・HELLO GOOKIEの新規追加 ・INDUSTRIAL SPYの新規追加 ・KILLSECの新規追加 ・MOGILEVICHの新規追加 ・MORLOCKの新規追加 ・NONAMEの新規追加 ・QIULONGの新規追加 ・RA WORLDの新規追加 ・RABBIT HOLEの新規追加 ・RANSOMHUBの新規追加 ・RANSOMWARE BLOGの新規追加 ・RED RANSOMWARE GROUP (RED CRYPTOAPP)の新規追加 ・SENSAYQの新規追加 ・SLUGの新規追加 ・SPACE BEARSの新規追加 ・TRISECの新規追加 ・UNDERGROUNDの新規追加 ・ZERO TOLERANCEの新規追加 ・0MEGA (OMEGA)の情報変更 ・AKIRAの情報変更 ・ALPHV (BLACKCAT)の情報変更 ・CL0P (CLOP)の情報変更 ・CONTIの情報変更 ・CUBAの情報変更 ・DIAVOLの情報変更 ・DRAGONFORCEの情報変更 ・GHOSTSECの情報変更 ・HUNTERS INTERNATIONALの情報変更 ・KNIGHTの情報変更 ・LOCKBIT3.0の情報変更 ・NETWALKERの情報変更 ・QILIN (AGENDA)の情報変更 ・RANSOMHOUSEの情報変更 ・ROYALの情報変更 ・STORMOUSの情報変更 ・THREEAM (3AM)の情報変更 ・WEREWOLVESの情報変更2024/6/10
2.21・2023LOCKの新規追加 ・APT INCの新規追加 ・ARGONAUTSの新規追加 ・AZZASECの新規追加 ・BABYLOCKERKZの新規追加 ・BASHEの新規追加 ・BLACKLOCKの新規追加 ・BLING LIBRAの新規追加 ・BLUEBOXの新規追加 ・BRAINCIPHERの新規追加 ・CHORTの新規追加 ・CICADA3301の新規追加 ・CRYPT GHOULSの新規追加 ・CYBERVOLKの新規追加 ・DEATHGRIPの新規追加 ・ESTATEの新規追加 ・FOGの新規追加 ・FUNKSECの新規追加 ・GD LOCKERSECの新規追加 ・HELLCATの新規追加 ・HELLDOWNの新規追加 ・INTERLOCKの新規追加 ・JUMPY PISCESの新規追加 ・KAIROSの新規追加 ・KEY GROUPの新規追加 ・KILLSEC3.0の新規追加 ・KRAKENの新規追加 ・LUKALOCKERの新規追加 ・LYNXの新規追加 ・MAD LIBERATORの新規追加 ・MEDUSAの新規追加 ・MEGAZORDの新規追加 ・MORPHEUSの新規追加 ・NITROGENの新規追加 ・NULLBULGEの新規追加 ・ORCAの新規追加 ・PLAYBOYの新規追加 ・PRYXの新規追加 ・RANSOMCORTEXの新規追加 ・REBORNの新規追加 ・RISENの新規追加 ・SAFEPAYの新規追加 ・SARCOMAの新規追加 ・SCRANSOMの新規追加 ・SEXIの新規追加 ・TERMITEの新規追加 ・TRINITYの新規追加 ・VALENCIAの新規追加 ・VANIRGROUPの新規追加 ・VENUSの新規追加 ・VOLCANO DEMONの新規追加 ・54BB47H (SABBATH)の情報変更 ・8BASEの情報変更 ・AKIRAの情報変更 ・ALPHV (BLACKCAT)の情報変更 ・APT73 (ERALEIG)の情報変更 ・BABUKの情報変更 ・BLACKSUITの情報変更 ・CHAOSの情報変更 ・DARKRACEの情報変更 ・DISPOSSESSORの情報変更 ・DONEXの情報変更 ・DRAGONFORCEの情報変更 ・EL DORADOの情報変更 ・EMBARGOの情報変更 ・HELLO KITTYの情報変更 ・HIVEの情報変更 ・HUNTERS INTERNATIONALの情報変更 ・INC RANSOMの情報変更 ・LOCKBIT3.0の情報変更 ・LOSTTRUSTの情報変更 ・MALLOXの情報変更 ・MEDUSALOCKERの情報変更 ・MEOWの情報変更 ・MORLOCKの情報変更 ・NONAMEの情報変更 ・PLAYの情報変更 ・QILINの情報変更 ・RANSOMHUBの情報変更 ・ROYALの情報変更 ・SENSAYQの情報変更 ・YASHMAの情報変更 ・ZEPPELINの情報変更2025/2/14

本図の作成に際して、弊社独自調査に併せ情報ソースとして参考にした主な参照先は以下の通り。
ランサムウェア攻撃グループ名関連情報として参考にさせて頂いた主な参照先
0MEGA (OMEGA)https://cyware.com/news/new-0mega-ransomware-joins-the-double-extortion-threat-landscape-158fb321/ https://www.bleepingcomputer.com/news/security/new-0mega-ransomware-targets-businesses-in-double-extortion-attacks https://www.helpnetsecurity.com/2023/06/07/0mega-ransomware-gang-changes-tactics/ https://www.linkedin.com/posts/keepnetlabs_0mega-ransomware-gang-changes-tactics-help-activity-7080546293990744065-GH6T/
54BB47H (SABBATH)https://securityaffairs.co/wordpress/125154/cyber-crime/sabbath-ransomware.html https://www.anvilogic.com/threat-reports/unc2190-arcane-and-sabbath https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/ https://www.mandiant.com/resources/sabbath-ransomware-affiliate
8BASEhttps://blogs.vmware.com/security/2023/06/8base-ransomware-a-heavy-hitting-player.html https://thecyberexpress.com/losttrust-claims-ferguson-wellman-cyber-attack/ https://twitter.com/ido_cohen2/status/1702742049328443826 https://www.europol.europa.eu/media-press/newsroom/news/key-figures-behind-phobos-and-8base-ransomware-arrested-in-international-cybercrime-crackdown
ABYSShttps://www.bleepingcomputer.com/news/security/hellokitty-ransomware-source-code-leaked-on-hacking-forum/
AKIRAhttps://arcticwolf.com/resources/blog/conti-and-akira-chained-together/ https://labs.k7computing.com/index.php/akira-ransomware-unleashing-chaos-using-conti-leaks/ https://www.cynet.com/blog/megazord-ransomware-technical-analysis-and-preventions/ https://www.scmagazine.com/news/blockchain-conti-akira-ransomware https://www.sentinelone.com/anthology/megazord/ https://www.trendmicro.com/ja_jp/research/23/j/ransomware-spotlight-akira.html https://x.com/MalGamy12/status/1651972583615602694
AKOhttps://blog.qualys.com/vulnerabilities-threat-research/2021/12/09/ransomware-ranzy-locker https://www.bleepingcomputer.com/news/security/ako-ransomware-another-day-another-infection-attacking-businesses/
ALPHA (MYDATA)https://netenrich.com/blog/alpha-ransomware-a-deep-dive-into-its-operations https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/alpha-netwalker-ransomware https://www.bleepingcomputer.com/news/security/alpha-ransomware-linked-to-netwalker-operation-dismantled-in-2021/ https://www.infosecurity-magazine.com/news/alpha-ransomware-launches-data/
ALPHV (BLACKCAT)https://securelist.com/sexi-key-group-mallox-ransomware/113183/ https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-ransomware-ttps https://thehackernews.com/2022/03/experts-find-some-affiliates-of.html https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://www.aha.org/system/files/media/file/2024/10/hc3%20tlp%20clear%20threat%20actor%20profile%20scattered%20spider-10-24-2024.pdf https://www.bleepingcomputer.com/news/security/alphv-ransomware-site-outage-rumored-to-be-caused-by-law-enforcement/ https://www.bleepingcomputer.com/news/security/blackcat-alphv-ransomware-linked-to-blackmatter-darkside-gangs/ https://www.bleepingcomputer.com/news/security/blackcat-ransomware-shuts-down-in-exit-scam-blames-the-feds/ https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/ https://www.bleepingcomputer.com/news/security/lockbit-ransomware-now-poaching-blackcat-noescape-affiliates/ https://www.cyfirma.com/research/tracking-ransomware-july-2024/ https://www.esentire.com/blog/nitrogen-campaign-2-0-reloads-with-enhanced-capabilities-leading-to-alphv-blackcat-ransomware https://www.group-ib.com/blog/shadowsyndicate-raas/ https://www.metabaseq.com/threat/babuk-ransomware-behind-the-sexi-campaign/ https://www.ransomlook.io/group/nitrogen https://www.securityweek.com/law-enforcement-reportedly-behind-takedown-of-blackcat-alphv-ransomware-website/ https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-blackcat https://www.truesec.com/hub/blog/dissecting-the-cicada
ARCANEhttps://www.natlawreview.com/article/rebranded-ransomware-group-sabbath-hitting-hospitals-and-schools
ARCUS MEDIAhttps://dailydarkweb.net/new-ransomware-group-arcus-attacks-targeted-south-american-companies/ https://x.com/AlvieriD/status/1790971069358027010
ARVINCLUBhttps://cloudsek.com/threatintelligence/ransomware-group-profile-arvin-club/
ASTRO (ASTRA)https://blog.reversinglabs.com/blog/smash-and-grab-astralocker-2-pushes-ransomware-direct-from-office-docs https://id-ransomware.blogspot.com/2020/08/cbtucyny-ransomware.html https://twitter.com/Arkbird_SOLG/status/1393994616496590848 https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://twitter.com/darktracer_int/status/1433694601076822016 https://www.bleepingcomputer.com/news/security/mountlocker-ransomware-uses-windows-api-to-worm-through-networks/ https://www.cybereason.com/blog/cybereason-vs.-quantum-locker-ransomware https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.mbsd.jp/research/20210415/astro-locker/ https://www.tetradefense.com/wp-content/uploads/2021/06/ThreatIntel_May_RoundUp_Compressed.pdf
ATOMSILOhttps://medium.com/s2wblog/atomsilo-x-lockfile-atomsilo-copied-blackmatter-and-cerber-for-operating-the-double-extortion-site-7fb5aaac5f21 https://news.sophos.com/ja-jp/2021/10/11/atom-silo-ransomware-actors-use-confluence-exploit-dll-side-load-for-stealthy-attack-jp/
AVADDONhttps://medium.com/s2wblog/quick-analysis-of-haron-ransomware-feat-avaddon-and-thanos-1ebb70f64dc4 https://www.bleepingcomputer.com/news/security/meet-noescape-avaddon-ransomware-gangs-likely-successor/#google_vignette
AVOSLOCKERhttps://iototsecnews.jp/2022/09/07/google-says-former-conti-ransomware-members-now-attack-ukraine/#more-27616 https://www.bleepingcomputer.com/news/security/fbi-avoslocker-ransomware-targets-us-critical-infrastructure/ https://www.trendmicro.com/ja_jp/research/22/g/ransomware-spotlight-avoslocker.html
AXXEShttps://cloudsek.com/threatintelligence/axxes-ransomware-group-appears-to-be-the-rebranded-version-of-midas-group/
BABUKhttps://blog.reversinglabs.com/blog/smash-and-grab-astralocker-2-pushes-ransomware-direct-from-office-docs https://blog.talosintelligence.com/de-anonymizing-ransomware-domains-on/ https://blog.trendmicro.co.jp/archives/31517 https://cybelangel.com/blog/babuk-group-just-another-ransomware-gang/ https://cyberint.com/blog/research/babuk-locker/ https://cyble.com/blog/technical-look-at-termite-ransomware-blue-yonder/ https://research.checkpoint.com/2023/rorschach-a-new-sophisticated-and-fast-ransomware/ https://riskybiznews.substack.com/p/risky-biz-news-chinas-great-firewall https://securelist.com/sexi-key-group-mallox-ransomware/113183/ https://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://thehackernews.com/2023/12/behind-scenes-of-matveevs-ransomware.html https://www.bleepingcomputer.com/news/security/babuk-ransomware-readies-shut-down-post-plans-to-open-source-malware/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.cyfirma.com/research/tracking-ransomware-july-2024/ https://www.databreaches.net/babuk-re-organizes-as-payload-bin-offers-its-first-leak/ https://www.group-ib.com/blog/bablock-ransomware/ https://www.metabaseq.com/threat/babuk-ransomware-behind-the-sexi-campaign/ https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/ https://www.trellix.com/en-gb/about/newsroom/stories/research/yanluowang-ransomware-leaks-analysis.html https://www.trendmicro.com/en_us/research/21/b/new-in-ransomware.html https://www.uptycs.com/blog/cyclops-ransomware-stealer-combo
BABUK2023https://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/
BADLOCK (RORSCHACH)https://research.checkpoint.com/2023/rorschach-a-new-sophisticated-and-fast-ransomware/ https://www.group-ib.com/blog/bablock-ransomware/
BIANLIANhttps://securityaffairs.com/155893/cyber-crime/bianlian-white-rabbit-mario-ransomware-joint-campaign.html https://www.bleepingcomputer.com/news/security/bianlian-ransomware-gang-shifts-focus-to-pure-data-extortion/
BIG HEADhttps://www.trendmicro.com/en_us/research/23/g/tailing-big-head-ransomware-variants-tactics-and-impact.html
BITPAYMERhttps://www.bleepingcomputer.com/news/security/bitpaymer-ransomware-infection-forces-alaskan-town-to-use-typewriters-for-a-week/ https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/
BL4CKT0R (BLACKTOR)https://www.tetradefense.com/wp-content/uploads/2021/08/ThreatIntel_July2021_RoundUp_Compressed.pdf
BLACKBASTAhttps://digitaldata-forensics.com/column/ransomware/type/4415/ https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-linked-to-the-fin7-hacking-group/ https://www.cybereason.co.jp/blog/ransomware/9263/ https://www.cybereason.com/blog/cybereason-vs.-black-basta-ransomware https://www.trendmicro.com/ja_jp/research/22/f/examining-the-black-basta-ransomwares-infection-routine.html https://www.zscaler.com/blogs/security-research/back-black-basta
BLACKBIThttps://asec.ahnlab.com/en/51497/ https://blog.cyble.com/2023/05/03/blackbit-ransomware-a-threat-from-the-shadows-of-lokilocker/
BLACKBYTEhttps://broadcom-software.security.com/blogs/japanese-broadcom-software/exbyte-blackbyteransamuueanogongjikurufukaxintanatetaqiequtsuruwozhankai https://research.nccgroup.com/2022/07/13/climbing-mount-everest-black-byte-bytes-back/ https://www.anvilogic.com/threat-reports/conti-its-subsidiary-group-blackbyte https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-gang-is-back-with-new-extortion-tactics/ https://www.trendmicro.com/ja_jp/research/22/i/ransomware-spotlight-blackbyte.html https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-blackbyte
BLACKMAGIChttps://blog.cyble.com/2022/12/07/a-closer-look-at-blackmagic-ransomware/
BLACKMATTERhttps://cluster25.io/2022/07/06/lockbit-3-0-making-the-ransomware-great-again/ https://mytechdecisions.com/it-infrastructure/what-darksides-rebranding-means-for-it/ https://thehackernews.com/2022/03/experts-find-some-affiliates-of.html https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://twitter.com/cyb3rops/status/1544216630296825856 https://twitter.com/threatray/status/1544643305924960256 https://www.bleepingcomputer.com/news/security/blackcat-alphv-ransomware-linked-to-blackmatter-darkside-gangs/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/ https://www.itmedia.co.jp/news/articles/2108/16/news052.html https://www.theregister.com/2022/09/25/noberus_ransomware_symantec/ https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-blackcat
BLACKOUThttps://socradar.io/dark-peep-12-the-ransomware-group-that-never-was/
BLACKSHADOW (SPECTRAL KITTEN)https://www.binarydefense.com/threat_watch/blackshadow-threat-group-breaches-israeli-hosting-firm/
BLACKSNAKEhttps://blog.cyble.com/2023/03/09/blacksnake-ransomware-emerges-from-chaos-ransomwares-shadow/
BLACKSUIThttps://blog.cyble.com/2023/05/12/blacksuit-ransomware-strikes-windows-and-linux-users/ https://socradar.io/dark-web-profile-blacksuit-ransomware/ https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html
BLOODYhttps://securityaffairs.co/wordpress/136345/cyber-crime/bl00dy-ransomware-lockbit-3-encryptor.html https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/
BLUESKYhttps://unit42.paloaltonetworks.jp/bluesky-ransomware/
BUHTIhttps://news.sophos.com/en-us/2024/02/23/connectwise-screenconnect-attacks-deliver-malware/
CACTUShttps://securityaffairs.com/155184/cyber-crime/danabot-spread-cactus-ransomware.html https://www.group-ib.com/blog/shadowsyndicate-raas/ https://x.com/MsftSecIntel/status/1730383711437283757?s=20
CATB (CAT99 / BAXTOY)https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection/ https://www.sentinelone.com/blog/decrypting-catb-ransomware-analyzing-their-latest-attack-methods/
CERBERhttps://cyble.com/blog/cerber2021-ransomware-back-in-action/ https://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/ https://www.itmedia.co.jp/news/articles/2108/16/news052.html https://www.trendmicro.com/en_us/research/17/e/cerber-ransomware-evolution.html https://www.trendmicro.com/ja_jp/research/23/l/cerber-ransomware-exploits-cve-2023-22518.html
CHAOShttps://blogs.blackberry.com/ja/jp/2022/06/yashma-ransomware-tracing-the-chaos-family-tree https://jp.broadcom.com/support/security-center/protection-bulletin/key-group-targeting-russian-users-with-evolving-ransomware https://securelist.com/key-group-ransomware-samples-and-telegram-schemes/114025/ https://www.sonicwall.com/blog/key-group-russian-ransomware-gang-uses-extensive-multi-purpose-telegram-channel
CHEERShttps://blog.trendmicro.co.jp/archives/31517 https://securityaffairs.co/wordpress/136611/malware/apt10-cheerscrypt-ransomware.html https://www.bleepingcomputer.com/news/security/cheerscrypt-ransomware-linked-to-a-chinese-hacking-group/
CHILE LOCKER (ARCRYPTER)https://blog.cyble.com/2023/07/06/arcrypt-ransomware-evolves-with-multiple-tor-communication-channels/ https://www.fortinet.com/blog/threat-research/ransomware-roundup-bisamware-and-chile-locker
CL0P (CLOP)https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/ https://fourcore.io/blogs/clop-ransomware-history-adversary-simulation https://gemserv.com/our-thoughts/threat-actor-review-clop-ransomware-group/ https://sectrio.com/deconstructing-cl0p-ransomware-moveit-2023-breach/ https://securityaffairs.co/wordpress/137722/malware/raspberry-robin-clop-ransomware.html https://thehackernews.com/2023/04/microsoft-confirms-papercut-servers.html https://thehackernews.com/2023/06/microsoft-lace-tempest-hackers-behind.html https://unit42.paloaltonetworks.jp/clop-ransomware/ https://www.bleepingcomputer.com/news/security/clop-ransomware-uses-truebot-malware-for-access-to-networks/ https://www.bleepingcomputer.com/news/security/microsoft-links-raspberry-robin-worm-to-clop-ransomware-attacks/ https://www.bleepingcomputer.com/news/security/microsoft-notorious-fin7-hackers-return-in-clop-ransomware-attacks/ https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a https://www.group-ib.com/blog/shadowsyndicate-raas/
CLOAKhttps://www.sentinelone.com/blog/threat-actor-interplay-good-days-victim-portals-and-their-ties-to-cloak/
CONTIhttps://arcticwolf.com/resources/blog/conti-and-akira-chained-together/ https://blog.bushidotoken.net/2022/11/the-continuity-of-conti.html https://blog.cyble.com/2022/12/22/new-ransomware-strains-emerging-from-leaked-contis-source-code/ https://labs.k7computing.com/index.php/akira-ransomware-unleashing-chaos-using-conti-leaks/ https://news.sophos.com/ja-jp/2021/03/03/conti-ransomware-attack-day-by-day-jp/ https://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://socradar.io/dark-web-profile-blacksuit-ransomware/ https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://thehackernews.com/2023/12/behind-scenes-of-matveevs-ransomware.html https://twitter.com/VK_Intel/status/1557003350541242369 https://twitter.com/uuallan/status/1564655718531219456 https://unit42.paloaltonetworks.jp/atoms/conti-ransomware/ https://www.axios.com/2023/05/09/royal-ransomware-us-cities-cybersecurity-hacking https://www.bleepingcomputer.com/news/security/conti-ransomware-shows-signs-of-being-ryuks-successor/ https://www.bleepingcomputer.com/news/security/karakurt-revealed-as-data-extortion-arm-of-conti-cybercrime-syndicate/ https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/ https://www.bleepingcomputer.com/news/security/researchers-link-3am-ransomware-to-conti-royal-cybercrime-gangs/ https://www.fortinet.com/blog/threat-research/ransomware-roundup-new-vohuk-scarecrow-and-aerst-variants https://www.group-ib.com/blog/shadowsyndicate-raas/ https://www.kelacyber.com/wp-content/uploads/2022/05/KELA-Intelligence-Report-ContiLeaks-JA-1.pdf https://www.scmagazine.com/news/blockchain-conti-akira-ransomware https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/ https://www.trellix.com/en-gb/about/newsroom/stories/research/yanluowang-ransomware-leaks-analysis.html https://www.trellix.com/en-us/about/newsroom/stories/research/a-royal-analysis-of-royal-ransom.html https://www.trendmicro.com/ja_jp/research/22/l/ransomware-spotlight-blackcat.html https://www.trendmicro.com/ja_jp/research/23/j/ransomware-spotlight-akira.html https://x.com/MalGamy12/status/1651972583615602694
COOMING PROJECThttps://www.cisa.gov/uscert/ncas/alerts/aa22-110a
COREIDhttps://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-ransomware-ttps https://www.techrepublic.com/article/colonial-pipeline-ransomware-group-using-new-tactics-to-become-more-dangerous/ https://www.theregister.com/2022/09/25/noberus_ransomware_symantec/ https://www.zdnet.com/article/fin7-hackers-evolve-operations-with-ransomware-novel-backdoor/
CROSSROCKhttps://jp.sentinelone.com/anthology/crosslock/
CRYKAL / CRYLOCKhttps://heimdalsecurity.com/blog/crylock-ransomware/ https://unit42.paloaltonetworks.jp/trigona-ransomware-update/
CRYPTOMIXhttps://www.infoblox.com/wp-content/uploads/threat-intelligence-report-cryptomix-ransomware-cyber-report.pdf
CRYPTONhttps://cyware.com/news/what-is-crypton-ransomware-new-campaign-sees-hackers-exploiting-remote-desktop-services-097a4372 https://www.twx-threatintel.com/hobokomo-securitynews/20220706/tips-342/
CRYPTWALLhttps://www.infoblox.com/wp-content/uploads/threat-intelligence-report-cryptomix-ransomware-cyber-report.pdf
CRYPTXXXhttps://www.infoblox.com/wp-content/uploads/threat-intelligence-report-cryptomix-ransomware-cyber-report.pdf
CRYSIShttps://blogs.blackberry.com/ja/jp/2021/11/threat-thursday-phobos-ransomware
CUBAhttps://www.bleepingcomputer.com/news/security/industrial-spy-data-extortion-market-gets-into-the-ransomware-game/ https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-cuba
CYCLOPShttps://blog.talosintelligence.com/qakbot-affiliated-actors-distribute-ransom/ https://www.bleepingcomputer.com/news/security/knight-ransomware-distributed-in-fake-tripadvisor-complaint-emails/ https://www.uptycs.com/blog/cyclops-ransomware-stealer-combo
CYLANCEhttps://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/
DAGON LOCKERhttps://asec.ahnlab.com/ko/41577/
DAIXINhttps://www.bleepingcomputer.com/news/security/us-govt-warns-of-daixin-team-targeting-health-orgs-with-ransomware/
DARK VAULThttps://cybernews.com/news/lockbit-dark-vault-rebrand/
DARKANGELShttps://blog.cyble.com/2022/05/06/rebranded-babuk-ransomware-in-action-darkangels-ransomware-performs-targeted-attack/ https://blog.talosintelligence.com/de-anonymizing-ransomware-domains-on/ https://cyware.com/news/darkangels-a-rebranded-version-of-babuk-8c62474b https://thecyberexpress.com/dark-angels-ransomware-dunghill-leak/
DARKRYPThttps://www.digitalshadows.com/blog-and-research/ransomware-q4-overview/
DARKSIDEhttps://mytechdecisions.com/it-infrastructure/what-darksides-rebranding-means-for-it/ https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://www.bleepingcomputer.com/news/security/blackcat-alphv-ransomware-linked-to-blackmatter-darkside-gangs/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/ https://www.flashpoint.io/blog/darkside-ransomware-links-to-revil-difficult-to-dismiss/ https://www.theregister.com/2022/09/25/noberus_ransomware_symantec/
DATAFhttps://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/
DEATHRANSOMhttps://www.bleepingcomputer.com/news/security/hellokitty-ransomware-source-code-leaked-on-hacking-forum/
DEFRAY777https://unit42.paloaltonetworks.jp/ransomware-threat-assessments/8/ https://www.cybereason.com/blog/cybereason-vs.-ransomexx-ransomware https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
DHARMAhttps://blogs.blackberry.com/ja/jp/2021/11/threat-thursday-phobos-ransomware https://cyberenso.jp/types-of-ransomware/dharma-ransomware/ https://www.europol.europa.eu/media-press/newsroom/news/international-collaboration-leads-to-dismantlement-of-ransomware-group-in-ukraine-amidst-ongoing-war
DIAVOLhttps://arcticwolf.com/resources/blog/karakurt-web/ https://www.fortinet.com/jp/blog/threat-research/diavol-new-ransomware-used-by-wizard-spider https://www.kelacyber.com/wp-content/uploads/2022/05/KELA-Intelligence-Report-ContiLeaks-JA-1.pdf
DIKEhttps://mdba.info/ransomware/2022/03/20/%E3%80%8C-dike%E3%80%8D%E3%80%8C-zozl%E3%80%8D%E6%8B%A1%E5%BC%B5%E5%AD%90%E3%81%AB%E6%9A%97%E5%8F%B7%E5%8C%96%E3%81%99%E3%82%8Bphobos%E3%83%A9%E3%83%B3%E3%82%B5%E3%83%A0%E3%82%A6%E3%82%A7%E3%82%A2-202/
DISPOSSESSORhttps://gbhackers.com/dispossessor-and-radar-ransomware/ https://webz.io/dwp/lockbit-reborn-new-site-defies-fbi-takedown https://www.fbi.gov/contact-us/field-offices/cleveland/news/international-investigation-leads-to-shutdown-of-ransomware-group https://www.infosecurity-magazine.com/news/fbi-dismantle-radardispossessor/
DONUThttps://www.bleepingcomputer.com/news/security/donut-extortion-group-also-targets-victims-with-ransomware/
DOPPELPAYMERhttps://socprime.com/blog/doppelpaymer-ransomware-detection/ https://socradar.io/dark-web-threat-profile-grief-ransomware-group/ https://unit42.paloaltonetworks.jp/ransomware-threat-assessments/4/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/
DRAGONFORCEhttps://cyble.com/blog/lockbit-blacks-legacy-unraveling-the-dragonforce-ransomware-connection/ https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/ https://www.group-ib.com/blog/dragonforce-ransomware/
DUNGHILLhttps://thecyberexpress.com/dark-angels-ransomware-dunghill-leak/
ECH0RAIX (ECHORAIX)https://unit42.paloaltonetworks.jp/ech0raix-ransomware-soho/ https://www.bleepingcomputer.com/news/security/new-ech0raix-ransomware-brute-forces-qnap-nas-devices/ https://www.bleepingcomputer.com/ransomware/decryptor/ech0raix-ransomware-decryptor-restores-qnap-files-for-free/
EGREGORhttps://unit42.paloaltonetworks.jp/egregor-ransomware-courses-of-action/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.trendmicro.com/ja_jp/research/21/k/QAKBOT-new-attack-technique.html
EL_COMETAhttps://www.bleepingcomputer.com/news/security/synack-ransomware-releases-decryption-keys-after-el-cometa-rebrand/
EMBARGOhttps://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/ https://www.bleepingcomputer.com/news/security/largest-non-bank-lender-in-australia-warns-of-a-data-breach/
EMPEROR DRAGONFLYhttps://blog.sygnia.co/revealing-emperor-dragonfly-a-chinese-ransomware-group
ENTROPYhttps://cyberintelmag.com/malware-viruses/dridex-malware-downloader-connected-to-entropy-ransomware/ https://news.sophos.com/ja-jp/2022/02/23/dridex-bots-deliver-entropy-ransomware-in-recent-attacks-jp/ https://www.bleepingcomputer.com/news/security/entropy-ransomware-linked-to-evil-corps-dridex-malware/ https://www.cyclonis.com/ja/entropy-ransomware-may-have-links-to-the-dridex-gang/
EP918https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-28-3/
ERUPTIONhttps://securityaffairs.co/wordpress/125154/cyber-crime/sabbath-ransomware.html https://www.mandiant.com/resources/sabbath-ransomware-affiliate
EVERESThttps://exchange.xforce.ibmcloud.com/threats/guid:63387e50bd9400dc12ea6b47140aa0db https://kcm.trellix.com/corporate/index?page=content&id=KB96132 https://research.nccgroup.com/2022/07/13/climbing-mount-everest-black-byte-bytes-back/ https://socradar.io/on-the-horizon-ransomed-vc-ransomware-group-spotted-in-the-wild/ https://www.marketscreener.com/quote/stock/NCC-GROUP-PLC-4004767/news/NCC-Monthly-Threat-Pulse-ndash-November-2021-37387006/
EVIL CORPhttps://e.cyberint.com/hubfs/Cyberint_Evil%20Corp%20Wastedlocker%20Ransomware_Report.pdf https://heimdalsecurity.com/blog/macaw-locker-evil-corps-latest-version-makes-new-victims/ https://pchandy.net/2021/06/new-evil-corp-ransomware-mimics-payloadbin-gang-to-evade-us-sanctions/ https://socprime.com/blog/doppelpaymer-ransomware-detection/ https://threatpost.com/evil-corp-impersonates-payloadbin/166710/ https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://twitter.com/vxunderground/status/1533948505043124224 https://www.bleepingcomputer.com/news/security/entropy-ransomware-linked-to-evil-corps-dridex-malware/ https://www.bleepingcomputer.com/news/security/evil-corp-switches-to-lockbit-ransomware-to-evade-sanctions/ https://www.bleepingcomputer.com/news/security/new-evil-corp-ransomware-mimics-payloadbin-gang-to-evade-us-sanctions/ https://www.enigmasoftware.com/dridex-gang-returns-with-wastedlocker-ransomware/ https://www.mandiant.com/resources/blog/unc2165-shifts-to-evade-sanctions
EXORCISThttps://sequretek.com/wp-content/uploads/2018/10/Sequretek-Advisory-Exorcist-Ransomware_.pdf https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-24th-2020-navigation-failure/
FAUSThttps://thehackernews.com/2024/01/albabat-kasseika-kuiper-new-ransomware.html
FONIX (XINOF)https://www.malwarebytes.com/blog/news/2021/02/fonix-ransomware-gives-up-life-of-crime-apologises
GANDCRABhttps://krebsonsecurity.com/2019/07/is-revil-the-new-gandcrab-ransomware/ https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/
GHOSTSEChttps://socradar.io/the-five-families-hacker-collaboration-redefining-the-game/ https://thehackernews.com/2024/03/alert-ghostsec-and-stormous-launch.html https://www.sompocybersecurity.com/column/column/hacker-group-launches-ghostlocker-raas
GOOD DAYhttps://www.sentinelone.com/blog/threat-actor-interplay-good-days-victim-portals-and-their-ties-to-cloak/
GRIEFhttps://cyberintelmag.com/malware-viruses/dridex-malware-downloader-connected-to-entropy-ransomware/ https://socradar.io/dark-web-threat-profile-grief-ransomware-group/ https://www.bleepingcomputer.com/news/security/entropy-ransomware-linked-to-evil-corps-dridex-malware/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/
GROOVEhttps://blogs.mcafee.jp/how-groove-gang-is-shaking-up-the-ransomware-as-a-service-market-to-empower-affiliates https://krebsonsecurity.com/2021/11/the-groove-ransomware-gang-was-a-hoax/ https://medium.com/s2wblog/groove-x-ramp-the-relation-between-groove-babuk-ramp-and-blackmatter-f75644f8f92d https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.trellix.com/ja-jp/about/newsroom/stories/research/how-groove-gang-is-shaking-up-the-ransomware-as-a-service-market-to-empower-affiliates.html
HARDBIThttps://www.bleepingcomputer.com/news/security/hardbit-ransomware-wants-insurance-details-to-set-the-perfect-price/ https://www.securityweek.com/hardbit-ransomware-offers-to-set-ransom-based-on-victims-cyberinsurance/ https://www.suspectfile.com/interview-with-hardbit-ransomware-a-new-group-with-great-ambitions/ https://www.varonis.com/blog/hardbit-2.0-ransomware
HARONhttps://medium.com/s2wblog/quick-analysis-of-haron-ransomware-feat-avaddon-and-thanos-1ebb70f64dc4 https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-44-3/
HELLB0RNhttps://www.zerofox.com/blog/the-underground-economist-issue-5/
HELLO GOOKIEhttps://blog.barracuda.com/2024/04/24/hellokitty--hellogookie--hello--lockbit https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-rebrands-releases-cd-projekt-and-cisco-data/
HELLO KITY (FIVE HANDS)https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-source-code-leaked-on-hacking-forum/ https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development/ https://www.trellix.com/en-gb/about/newsroom/stories/research/yanluowang-ransomware-leaks-analysis.html
HERMEShttps://www.cybereason.co.jp/blog/ransomware/5607/ https://www.infoblox.com/wp-content/uploads/threat-intelligence-report-hermes-ransomware-cyber-report.pdf
HITLER (AGL0BGVYCG)https://en.wikipedia.org/wiki/Hitler-Ransomware
HIVEhttps://northwave-security.com/conti-ryuk-and-hive-affiliates-the-hidden-link/ https://thehackernews.com/2023/11/new-ransomware-group-emerges-with-hives.html https://thehackernews.com/2023/12/behind-scenes-of-matveevs-ransomware.html https://www.bleepingcomputer.com/news/security/donut-extortion-group-also-targets-victims-with-ransomware/ https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/ https://www.bleepingcomputer.com/news/security/new-hunters-international-ransomware-possible-rebrand-of-hive/ https://www.europol.europa.eu/media-press/newsroom/news/international-collaboration-leads-to-dismantlement-of-ransomware-group-in-ukraine-amidst-ongoing-war https://www.trendmicro.com/en_us/research/22/c/nokoyawa-ransomware-possibly-related-to-hive-.html https://www.trendmicro.com/ja_jp/research/22/i/play-ransomware-s-attack-playbook-unmasks-it-as-another-hive-aff.html
HOLYGHOSThttps://www.bleepingcomputer.com/news/security/microsoft-links-holy-ghost-ransomware-operation-to-north-korean-hackers/ https://www.digitalshadows.com/blog-and-research/holy-ghosts-bargain-basement-approach-to-ransomware/ https://www.hackread.com/lessons-from-holy-ghost-ransomware-attacks/
HUNTERS INTERNATIONALhttps://iototsecnews.jp/2023/10/29/new-hunters-international-ransomware-possible-rebrand-of-hive/ https://thehackernews.com/2023/11/new-ransomware-group-emerges-with-hives.html https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/ https://www.bleepingcomputer.com/news/security/new-hunters-international-ransomware-possible-rebrand-of-hive/ https://www.quorumcyber.com/malware-reports/hunters-international-ransomware-report/
ICEFIREhttps://twitter.com/malwrhunterteam/status/1503484073406345224/photo/3
INDUSTRIAL SPYhttps://securityscorecard.com/research/a-technical-analysis-of-the-underground-ransomware-deployed-by-storm-0978/ https://unit42.paloaltonetworks.jp/cuba-ransomware-tropical-scorpius/#post-124395-_xnikeicczfm4 https://www.bleepingcomputer.com/news/security/industrial-spy-data-extortion-market-gets-into-the-ransomware-game/ https://www.fortiguard.com/threat-signal-report/5215/underground-team-ransomware https://www.privacyaffairs.com/underground-ransomware-actor-breaches-11-targets/
ISOShttps://mdba.info/ransomware/2020/10/02/%E3%80%8C-isos%E3%80%8D%E6%8B%A1%E5%BC%B5%E5%AD%90%E3%81%AB%E6%9A%97%E5%8F%B7%E5%8C%96%E3%81%99%E3%82%8Bphobos%E3%83%A9%E3%83%B3%E3%82%B5%E3%83%A0%E3%82%A6%E3%82%A7%E3%82%A2/
JIGSAWhttp://maruyama-mitsuhiko.cocolog-nifty.com/security/2022/05/post-ea8ab8.html https://www.secureworld.io/industry-news/venezuelan-doctor-jigsaw-thanos-ransomware
JSWORMhttps://cyware.com/news/its-time-we-talk-about-jsworm-ransomware-32787a6b https://www.bleepingcomputer.com/news/security/new-karma-ransomware-group-likely-a-nemty-rebrand/
KARAKURThttps://www.bleepingcomputer.com/news/security/karakurt-revealed-as-data-extortion-arm-of-conti-cybercrime-syndicate/
KARMAhttps://blogs.blackberry.com/en/2021/11/threat-thursday-karma-ransomware https://gadgettendency.com/new-ransomware-group-karma-actually-renamed-nefilim/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.cyfirma.com/outofband/karma-leak-ransomware-technical-analysis/ https://www.sentinelone.com/labs/nokoyawa-ransomware-new-karma-nemty-variant-wears-thin-disguise/
KILLSEChttps://foresiet.com/blog/kill-ransomware-a-new-entrant-strikes-breaching-kerala-police-and-beyond https://ransomwareattacks.halcyon.ai/news/ransomware-on-the-move-ra-world-killsec-8base-medusa
KNIGHThttps://blog.talosintelligence.com/qakbot-affiliated-actors-distribute-ransom/ https://symantec-enterprise-blogs.security.com/threat-intelligence/ransomhub-knight-ransomware https://thehackernews.com/2024/06/rebranded-knight-ransomware-targeting.html https://www.bleepingcomputer.com/news/security/knight-ransomware-distributed-in-fake-tripadvisor-complaint-emails/ https://www.bleepingcomputer.com/news/security/knight-ransomware-source-code-for-sale-after-leak-site-shuts-down/
LAPSUS$https://iototsecnews.jp/2022/09/13/cisco-data-breach-attributed-to-lapsus-ransomware-group/ https://jp.tenable.com/blog/brazen-unsophisticated-and-illogical-understanding-the-lapsus-extortion-group https://wired.jp/article/okta-hack-microsoft-bing-code-leak-lapsus/
LILITHhttps://www.bleepingcomputer.com/news/security/new-lilith-ransomware-emerges-with-extortion-site-lists-first-victim/
LIZARDhttps://www.enigmasoftware.jp/lizardphobosransomware-sakujo/
LOCK4https://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/
LOCKBIT (ABCD)https://www.herjavecgroup.com/herjavec-group-lockbit-2-0-ransomware-profile/ https://www.kaspersky.co.jp/resource-center/threats/lockbit-ransomware
LOCKBIT2.0https://research.checkpoint.com/2023/rorschach-a-new-sophisticated-and-fast-ransomware/ https://thehackernews.com/2023/12/behind-scenes-of-matveevs-ransomware.html https://twitter.com/alvierid/status/1737763750940151998?s=61&t=cbDfoCunjPFFOy6AuZb1rw https://www.bleepingcomputer.com/news/security/evil-corp-switches-to-lockbit-ransomware-to-evade-sanctions/ https://www.group-ib.com/blog/bablock-ransomware/ https://www.herjavecgroup.com/herjavec-group-lockbit-2-0-ransomware-profile/ https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions https://www.uptycs.com/blog/cyclops-ransomware-stealer-combo
LOCKBIT3.0https://cluster25.io/2022/07/06/lockbit-3-0-making-the-ransomware-great-again/ https://codebook.machinarecord.com/threatreport/34066/ https://dailydarkweb.net/play-ransomware-and-lockbit-allegedly-created-an-alliance/ https://news.sophos.com/en-us/2024/02/23/connectwise-screenconnect-attacks-deliver-malware/ https://securelist.com/crypt-ghouls-hacktivists-tools-overlap-analysis/114217/ https://securelist.com/sexi-key-group-mallox-ransomware/113183/ https://socradar.io/dark-peep-16-play-ransomware-lockbits-alliance-breachforums-leak-and-cyberniggers-revival/ https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit https://twitter.com/AlvieriD/status/1760640047433269282 https://twitter.com/threatray/status/1544643305924960256 https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/ https://www.bleepingcomputer.com/news/security/hackers-use-new-3am-ransomware-to-save-failed-lockbit-attack/ https://www.bleepingcomputer.com/news/security/lockbit-ransomware-now-poaching-blackcat-noescape-affiliates/ https://www.cyfirma.com/research/tracking-ransomware-july-2024/ https://www.huntress.com/blog/its-not-safe-to-pay-safepay https://www.pcrisk.com/removal-guides/25159-cryptbb-ransomware https://www.sentinelone.com/anthology/brain-cipher/ https://www.sentinelone.com/blog/deathgrip-raas-small-time-threat-actors-aim-high-with-lockbit-yashma-builders/ https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/ https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/nullbulge https://x.com/AlvieriD/status/1790971069358027010
LOCKDATAhttps://www.pcrisk.com/removal-guides/23846-lockdata-ransomware
LOCKERGOGAhttps://www.europol.europa.eu/media-press/newsroom/news/international-collaboration-leads-to-dismantlement-of-ransomware-group-in-ukraine-amidst-ongoing-war
LOCKFILEhttps://medium.com/s2wblog/atomsilo-x-lockfile-atomsilo-copied-blackmatter-and-cerber-for-operating-the-double-extortion-site-7fb5aaac5f21 https://news.sophos.com/ja-jp/2021/09/06/lockfile-ransomwares-box-of-tricks-intermittent-encryption-and-evasion-jp/
LOKI LOCKERhttps://asec.ahnlab.com/en/51497/ https://blog.cyble.com/2023/05/03/blackbit-ransomware-a-threat-from-the-shadows-of-lokilocker/ https://blogs.blackberry.com/ja/jp/2022/07/blackberry-prevents-lokilocker
LORENZhttps://arcticwolf.com/resources/blog/lorenz-ransomware-chiseling-in/ https://www.avertium.com/resources/threat-reports/an-in-depth-look-at-lorenz-ransomware https://www.cybereason.com/blog/research/cybereason-vs.-lorenz-ransomware
LOSTTRUSThttps://socradar.io/dark-web-profile-eldorado-ransomware/ https://www.bleepingcomputer.com/news/security/meet-losttrust-ransomware-a-likely-rebrand-of-the-metaencryptor-gang/ https://www.cyfirma.com/research/tracking-ransomware-june-2024/
LVhttps://www.secureworks.com/research/lv-ransomware
MACAW LOCKERhttps://heimdalsecurity.com/blog/macaw-locker-evil-corps-latest-version-makes-new-victims/ https://www.bleepingcomputer.com/news/security/evil-corp-demands-40-million-in-new-macaw-ransomware-attacks/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
MAILTOhttps://www.bleepingcomputer.com/news/security/mailto-netwalker-ransomware-targets-enterprise-networks/
MALLOX (FARGO)https://www.suspectfile.com/interview-with-mallox-ransomware-group/
MARIOhttps://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://securityaffairs.com/155893/cyber-crime/bianlian-white-rabbit-mario-ransomware-joint-campaign.html https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/
MAZEhttps://twitter.com/LawrenceAbrams/status/1519495698680623104 https://www.bleepingcomputer.com/news/security/maze-ransomware-is-shutting-down-its-cybercrime-operation/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.zerofox.com/blog/maze-recent-ransomware-attacks/
MBChttps://twitter.com/S0ufi4n3/status/1541150802332598279 https://www.thenationalnews.com/business/2021/08/21/mbc-ransomware-group-claims-responsibility-for-cyber-attack-on-irans-railway-network/
MEDUSA LOCKERhttps://www.cybereason.co.jp/blog/ransomware/5546/
MEGACORTEXhttps://www.europol.europa.eu/media-press/newsroom/news/international-collaboration-leads-to-dismantlement-of-ransomware-group-in-ukraine-amidst-ongoing-war https://www.trendmicro.com/ja_jp/research/21/k/QAKBOT-new-attack-technique.html
MEOWhttps://blog.cyble.com/2022/12/22/new-ransomware-strains-emerging-from-leaked-contis-source-code/ https://www.bleepingcomputer.com/news/security/conti-based-ransomware-meowcorp-gets-free-decryptor/
METAENCRYPTORhttps://www.bleepingcomputer.com/news/security/meet-losttrust-ransomware-a-likely-rebrand-of-the-metaencryptor-gang/
MIDAShttps://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-44-3/
MINDWAREhttps://www.sentinelone.com/blog/from-the-front-lines-another-rebrand-mindware-and-sfile-ransomware-technical-breakdown/
MOISHAhttps://blog.cyble.com/2022/08/25/moisha-ransomware-in-action/ https://cyware.com/news/new-moisha-ransomware-pulls-off-highly-targeted-attacks-4be35d93
MONTIhttps://blogs.blackberry.com/en/2022/09/the-curious-case-of-monti-ransomware-a-real-world-doppelganger https://intel471.com/blog/conti-vs-monti-a-reinvention-or-just-a-simple-rebranding https://thehackernews.com/2023/12/behind-scenes-of-matveevs-ransomware.html
MORLOCKhttps://securelist.com/crypt-ghouls-hacktivists-tools-overlap-analysis/114217/ https://www.facct.ru/blog/morlock-ransomware/
MOUNT LOCKERhttps://asec.ahnlab.com/ko/41577/ https://id-ransomware.blogspot.com/2020/08/cbtucyny-ransomware.html https://twitter.com/Arkbird_SOLG/status/1393994616496590848 https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://twitter.com/darktracer_int/status/1433694601076822016 https://www.barracuda.co.jp/mountlocker-ransomware/ https://www.bleepingcomputer.com/news/security/mount-locker-ransomware-joins-the-multi-million-dollar-ransom-game/ https://www.bleepingcomputer.com/news/security/mountlocker-ransomware-uses-windows-api-to-worm-through-networks/ https://www.cybereason.com/blog/cybereason-vs.-quantum-locker-ransomware https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.cyclonis.com/ja/mount-locker-ransomware-is-getting-more-dangerous/ https://www.guidepointsecurity.com/blog/mount-locker-ransomware-steps-up-counter-ir-capabilities/ https://www.tetradefense.com/wp-content/uploads/2021/06/ThreatIntel_May_RoundUp_Compressed.pdf
MY DECRYPTER (MAGNIBER)https://howtofix.guide/ransomware/magniber/ https://japan.zdnet.com/paper/30001345/30005842/ https://www.2-spyware.com/remove-my-decryptor-ransomware-virus.html
N3TW0RM (NETWORM)https://www.acronis.com/en-us/blog/posts/n3tw0rm-ransomware/ https://www.bleepingcomputer.com/news/security/n3tw0rm-ransomware-emerges-in-wave-of-cyberattacks-in-israel/
N4UGHTYSEChttps://www.itweb.co.za/content/o1Jr5Mx9BVjqKdWL https://www.pkware.com/blog/monthly-breach-report-april-2022-edition
NB65https://securityaffairs.co/130051/hacktivism/nb65-modified-version-conti-ransomware.html https://www.malwarebytes.com/blog/news/2022/04/conti-ransomware-offshoot-targets-russian-organizations
NEFILIMhttps://cyberenso.jp/types-of-ransomware/nephilim-ransomware/ https://gadgettendency.com/new-ransomware-group-karma-actually-renamed-nefilim/ https://www.bleepingcomputer.com/news/security/new-karma-ransomware-group-likely-a-nemty-rebrand/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
NEMTYhttps://www.bitdefender.com/blog/hotforsecurity/nemty-ransomware-gang-shuts-down-public-gig-announces-exclusive-business-model https://www.bleepingcomputer.com/news/security/new-karma-ransomware-group-likely-a-nemty-rebrand/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.sentinelone.com/labs/nokoyawa-ransomware-new-karma-nemty-variant-wears-thin-disguise/
NETWALKERhttps://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/alpha-netwalker-ransomware https://www.bleepingcomputer.com/news/security/alpha-ransomware-linked-to-netwalker-operation-dismantled-in-2021/ https://www.bleepingcomputer.com/news/security/ransomware-recruits-affiliates-with-huge-payouts-automated-leaks/ https://www.cybereason.co.jp/blog/ransomware/5845/
NEVADAhttps://www.zscaler.com/blogs/security-research/nevada-ransomware-yet-another-nokoyawa-variant
NIGHTSKYhttps://blog.sygnia.co/revealing-emperor-dragonfly-a-chinese-ransomware-group https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering/blob/main/NightSky_Ransomware%E2%80%93just_a_Rook_RW_fork_in_VMProtect_suit/NightSky_Ransomware%E2%80%93just_a_Rook_RW_fork_in_VMProtect_suit.md https://securityaffairs.co/wordpress/136611/malware/apt10-cheerscrypt-ransomware.html https://twitter.com/Arkbird_SOLG/status/1503435955306434562 https://twitter.com/vinopaljiri/status/1480059715392622597 https://www.forescout.com/blog/night-sky-a-short-lived-threat-from-a-long-lived-threat-actor/
NOKOYAWAhttps://blog.talosintelligence.com/de-anonymizing-ransomware-domains-on/ https://www.fortinet.com/blog/threat-research/nokoyawa-variant-catching-up https://www.group-ib.com/blog/farnetwork/ https://www.group-ib.com/blog/shadowsyndicate-raas/ https://www.sentinelone.com/labs/nokoyawa-ransomware-new-karma-nemty-variant-wears-thin-disguise/ https://www.trendmicro.com/en_us/research/22/c/nokoyawa-ransomware-possibly-related-to-hive-.html https://www.trendmicro.com/ja_jp/research/22/i/play-ransomware-s-attack-playbook-unmasks-it-as-another-hive-aff.html https://www.zscaler.com/blogs/security-research/nevada-ransomware-yet-another-nokoyawa-variant
NONAMEhttps://cybersecsentinel.com/ransomhub-affiliate-noname-group-launches-scransom-attacks/ https://medium.com/coinmonks/older-leaks-re-surfaces-lockbit-imitator-on-surface-web-2c85229a3cf7/ https://www.bleepingcomputer.com/news/security/noname-ransomware-gang-deploying-ransomhub-malware-in-recent-attacks/ https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/noname#:~:text=NO%2DNAME%20appears%20unrelated%20to%20another%20group%20with,3.0%20and%20has%20several%20data%20leak%20sites./ https://www.welivesecurity.com/en/eset-research/cosmicbeetle-steps-up-probation-period-ransomhub/
NOSCCAPEhttps://thehackernews.com/2023/12/behind-scenes-of-matveevs-ransomware.html https://www.bleepingcomputer.com/news/security/lockbit-ransomware-now-poaching-blackcat-noescape-affiliates/ https://www.bleepingcomputer.com/news/security/meet-noescape-avaddon-ransomware-gangs-likely-successor/#google_vignette
ONEPERCENThttps://cybersecurity-info.com/news/fbi-onepercent-group/
ONYXhttps://blogs.blackberry.com/ja/jp/2022/06/yashma-ransomware-tracing-the-chaos-family-tree
PANDORAhttps://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection/ https://twitter.com/Arkbird_SOLG/status/1503435955306434562 https://www.avertium.com/resources/threat-reports/in-depth-pandora-ransomware https://www.forescout.com/blog/night-sky-a-short-lived-threat-from-a-long-lived-threat-actor/ https://www.sentinelone.com/blog/decrypting-catb-ransomware-analyzing-their-latest-attack-methods/
PAY2KEYhttps://www.binarydefense.com/threat_watch/blackshadow-threat-group-breaches-israeli-hosting-firm/
PAYLOAD.BINhttps://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.databreaches.net/babuk-re-organizes-as-payload-bin-offers-its-first-leak/
PHOBOShttps://blogs.blackberry.com/ja/jp/2021/11/threat-thursday-phobos-ransomware https://mdba.info/ransomware/2020/10/02/%E3%80%8C-isos%E3%80%8D%E6%8B%A1%E5%BC%B5%E5%AD%90%E3%81%AB%E6%9A%97%E5%8F%B7%E5%8C%96%E3%81%99%E3%82%8Bphobos%E3%83%A9%E3%83%B3%E3%82%B5%E3%83%A0%E3%82%A6%E3%82%A7%E3%82%A2/ https://mdba.info/ransomware/2022/03/20/%E3%80%8C-dike%E3%80%8D%E3%80%8C-zozl%E3%80%8D%E6%8B%A1%E5%BC%B5%E5%AD%90%E3%81%AB%E6%9A%97%E5%8F%B7%E5%8C%96%E3%81%99%E3%82%8Bphobos%E3%83%A9%E3%83%B3%E3%82%B5%E3%83%A0%E3%82%A6%E3%82%A7%E3%82%A2-202/ https://www.enigmasoftware.jp/lizardphobosransomware-sakujo/ https://www.enigmasoftware.jp/steelransomware-sakujo/
PHOENIX LOCKERhttps://iototsecnews.jp/2022/06/02/evil-corp-switches-to-lockbit-ransomware-to-evade-sanctions/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
PLAYhttps://dailydarkweb.net/play-ransomware-and-lockbit-allegedly-created-an-alliance/ https://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://socradar.io/dark-peep-16-play-ransomware-lockbits-alliance-breachforums-leak-and-cyberniggers-revival/ https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/ https://www.group-ib.com/blog/shadowsyndicate-raas/ https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/ https://www.trendmicro.com/ja_jp/research/22/i/play-ransomware-s-attack-playbook-unmasks-it-as-another-hive-aff.html https://www.trendmicro.com/ja_jp/research/24/g/new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html
POLYVICEhttps://cyware.com/news/vice-society-adds-custom-branded-payload-polyvice-to-its-arsenal-a335bbe1 https://securityaffairs.co/139924/cyber-crime/vice-society-ransomware-custom-locker.html
PROLOCKhttps://www.blackberry.com/us/en/solutions/endpoint-security/ransomware-protection/qakbot https://www.bleepingcomputer.com/news/security/prolock-ransomware-teams-up-with-qakbot-trojan-for-network-access/ https://www.cisa.gov/sites/default/files/2023-02/202010221030_qakbot_tlpwhite.pdf https://www.intrinsec.com/egregor-prolock/ https://www.trendmicro.com/ja_jp/research/21/k/QAKBOT-new-attack-technique.html
PROMETHEUShttps://medium.com/s2wblog/prometheus-x-spook-prometheus-ransomware-rebranded-spook-ransomware-6f93bd8ab5dd https://www.cybereason.co.jp/blog/ransomware/6559/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
PUTIN TEAMhttps://blog.cyble.com/2022/12/22/new-ransomware-strains-emerging-from-leaked-contis-source-code/
PWNDLOCKERhttps://malpedia.caad.fkie.fraunhofer.de/details/win.pwndlocker https://www.bleepingcomputer.com/news/security/new-pwndlocker-ransomware-targeting-us-cities-enterprises/ https://www.bleepingcomputer.com/news/security/pwndlocker-fixes-crypto-bug-rebrands-as-prolock-ransomware/ https://www.trendmicro.com/ja_jp/research/21/k/QAKBOT-new-attack-technique.html
PYSA / MESPINOZAhttps://www.cybereason.co.jp/blog/ransomware/7069/ https://www.cybersecurity-insiders.com/details-of-new-pysa-n-everest-ransomware/ https://www.emsisoft.com/en/blog/38840/ransomware-profile-mespinoza-pysa/
QILIN (AGENDA)https://securityaffairs.co/wordpress/139811/cyber-crime/agenda-ransomware-rust.html https://twitter.com/alvierid/status/1737763750940151998?s=61&t=cbDfoCunjPFFOy6AuZb1rw https://www.guidepointsecurity.com/blog/grit-ransomware-report-october-2022/ https://www.trendmicro.com/ja_jp/research/22/i/new-golang-ransomware-agenda-customizes-attacks.html
QLOCKERhttps://iototsecnews.jp/2022/01/16/a-new-wave-of-qlocker-ransomware-attacks-targets-qnap-nas-devices/ https://www.bleepingcomputer.com/news/security/qlocker-ransomware-returns-to-target-qnap-nas-devices-worldwide/
QUANTUMhttps://asec.ahnlab.com/ko/41577/ https://id-ransomware.blogspot.com/2020/08/cbtucyny-ransomware.html https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/ https://www.cybereason.com/blog/cybereason-vs.-quantum-locker-ransomware https://www.group-ib.com/blog/shadowsyndicate-raas/
QUILONGhttps://cybersecuritynews.com/new-qiulong-ransomware-emerges/
RA GROUPhttps://riskybiznews.substack.com/p/risky-biz-news-chinas-great-firewall
RABBIT HOLEhttps://cybersecuritynews.com/rabbit-hole-ransomware/
RAGNAR LOCKERhttps://automaton-media.com/articles/newsjp/20201110-142870/ https://blog.cyble.com/2022/01/20/deep-dive-into-ragnar-locker-ransomware-gang/ https://therecord.media/ragnar-locker-ransomware-site-taken-down-fbi-europol https://www.cybereason.com/blog/threat-analysis-report-ragnar-locker-ransomware-targeting-the-energy-sector https://www.europol.europa.eu/media-press/newsroom/news/ragnar-locker-ransomware-gang-taken-down-international-police-swoop https://www.malwarebytes.com/blog/news/2023/10/ragnar-locker-taken-down
RAGNAROKhttps://resources.infosecinstitute.com/topic/malware-analysis-ragnarok-ransomware/ https://therecord.media/ragnarok-ransomware-operation-shuts-down-and-releases-free-decrypter/ https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-releases-master-decryptor-after-shutdown/ https://www.fortinet.com/jp/blog/threat-research/ranion-ransomware-quiet-and-persistent-raas
RAMPhttps://securityaffairs.co/121985/cyber-crime/groove-gang-fortinet-leaks.html https://www.advintel.io/post/groove-vs-babuk-groove-ransom-manifesto-ramp-underground-platform-secret-inner-workings
RANIONhttps://www.digitalshadows.com/blog-and-research/ransomware-franchising-how-do-groups-get-started/ https://www.fortinet.com/jp/blog/threat-research/ranion-ransomware-quiet-and-persistent-raas
RANSOM CARTELhttps://www.bleepingcomputer.com/news/security/ransom-cartel-linked-to-notorious-revil-ransomware-operation/
RANSOM CORPhttps://twitter.com/AlvieriD/status/1724269503633056240 https://twitter.com/EquationCorp/status/1724592227978985836 https://twitter.com/FalconFeedsio/status/1697879943911518363 https://twitter.com/signorina37H/status/1724314318856941729
RANSOMED.VChttps://socradar.io/on-the-horizon-ransomed-vc-ransomware-group-spotted-in-the-wild https://twitter.com/AlvieriD/status/1724269503633056240 https://twitter.com/EquationCorp/status/1724592227978985836 https://twitter.com/FalconFeedsio/status/1697879943911518363 https://twitter.com/karol_paciorek/status/1734590357260673170 https://twitter.com/signorina37H/status/1724314318856941729 https://www.zerofox.com/blog/ransomed-vc-sunsets-operations-auctions-off-infrastructure/
RANSOMEXXhttps://therecord.media/ibm-ransomexx-becomes-latest-ransomware-group-to-create-rust-variant/ https://www.cybereason.co.jp/blog/ransomware/5795/ https://www.cybereason.com/blog/cybereason-vs.-ransomexx-ransomware https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
RANSOMHOUSEhttps://blog.scilabs.mx/en/threat-profile-ransomhouse/ https://blogs.vmware.com/security/2023/06/8base-ransomware-a-heavy-hitting-player.html https://cyberint.com/blog/research/ransomhouse/ https://www.bleepingcomputer.com/news/security/keralty-ransomware-attack-impacts-colombias-health-care-system/ https://www.malwarebytes.com/blog/news/2022/05/threat-profile-ransomhouse-makes-extortion-work-without-ransomware https://www.scmagazine.com/brief/risk-management/novel-ransomhouse-cybercrime-operation-detailed https://www.shadowstackre.com/analysis/ransomhouse https://www.the420.in/ransomware-attack-on-pharma-company-aarti-drugs/
RANSOMHUBhttps://cybersecsentinel.com/ransomhub-affiliate-noname-group-launches-scransom-attacks/ https://symantec-enterprise-blogs.security.com/threat-intelligence/ransomhub-knight-ransomware https://thehackernews.com/2024/06/rebranded-knight-ransomware-targeting.html https://unit42.paloaltonetworks.com/threat-actor-groups-tracked-by-palo-alto-networks-unit-42/ https://www.aha.org/system/files/media/file/2024/10/hc3%20tlp%20clear%20threat%20actor%20profile%20scattered%20spider-10-24-2024.pdf https://www.bleepingcomputer.com/news/security/noname-ransomware-gang-deploying-ransomhub-malware-in-recent-attacks/ https://www.cyberdaily.au/security/10272-the-rise-of-ransomhub-uncovering-a-new-ransomware-as-a-service-operation https://www.welivesecurity.com/en/eset-research/cosmicbeetle-steps-up-probation-period-ransomhub/
RANSOMWARE BLOGhttps://www.kelacyber.com/wp-content/uploads/2022/11/KELA-RESEARCH_Ransomware-Victims-and-Network-Access-Sales-in-Q3-2022-JA.pdf
RANZYhttps://blog.qualys.com/vulnerabilities-threat-research/2021/12/09/ransomware-ranzy-locker
REDALERT (N13V)https://socradar.io/redalert-ransomware-targets-windows-and-linux-mware-esxi-servers/ https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development/
REDRANSOMEWARE GROUP (RED CRYPTOAPP)https://netenrich.com/blog/red-cryptoapp-ransomware-new-threat-group https://www.hackread.com/red-ransomware-group-red-cryptoapp-wall-of-shame/?web_view=true#google_vignette
RELIChttps://angle.ankura.com/post/102i1mb/relic-project-a-new-threat-group-or-rebranded-ransomware
REVIL (SODINOKIBI)https://blogs.mcafee.jp/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-the-all-stars https://krebsonsecurity.com/2019/07/is-revil-the-new-gandcrab-ransomware/ https://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://www.blackberry.com/us/en/solutions/endpoint-security/ransomware-protection/qakbot https://www.bleepingcomputer.com/news/security/ransom-cartel-linked-to-notorious-revil-ransomware-operation/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/ https://www.flashpoint.io/blog/darkside-ransomware-links-to-revil-difficult-to-dismiss/ https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/ https://www.trendmicro.com/ja_jp/research/21/k/QAKBOT-new-attack-technique.html https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-blackcat
RHYSIDAhttps://research.checkpoint.com/2023/the-rhysida-ransomware-activity-analysis-and-ties-to-vice-society/ https://socradar.io/threat-profile-rhysida-ransomware/ https://thehackernews.com/2023/08/new-report-exposes-vice-societys.html
ROBBINHOODhttps://www.sompocybersecurity.com/column/column/a72
ROOKhttps://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering/blob/main/NightSky_Ransomware%E2%80%93just_a_Rook_RW_fork_in_VMProtect_suit/NightSky_Ransomware%E2%80%93just_a_Rook_RW_fork_in_VMProtect_suit.md https://twitter.com/Arkbird_SOLG/status/1503435955306434562 https://twitter.com/vinopaljiri/status/1480059715392622597 https://www.avertium.com/resources/threat-reports/in-depth-pandora-ransomware https://www.forescout.com/blog/night-sky-a-short-lived-threat-from-a-long-lived-threat-actor/ https://www.prsol.cc/ja/post-2773/
ROYALhttps://blog.bushidotoken.net/2022/11/the-continuity-of-conti.html https://blog.cyble.com/2023/05/12/blacksuit-ransomware-strikes-windows-and-linux-users/ https://heimdalsecurity.com/blog/royal-ransomware-operation-amplifying-in-multi-million-dollar-attacks/ https://socradar.io/dark-web-profile-blacksuit-ransomware/ https://www.axios.com/2023/05/09/royal-ransomware-us-cities-cybersecurity-hacking https://www.bleepingcomputer.com/news/security/new-royal-ransomware-emerges-in-multi-million-dollar-attacks/ https://www.bleepingcomputer.com/news/security/researchers-link-3am-ransomware-to-conti-royal-cybercrime-gangs/ https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a https://www.cybereason.com/blog/royal-ransomware-analysis https://www.group-ib.com/blog/shadowsyndicate-raas/ https://www.scmagazine.com/brief/ransomware/royal-ransomware-tied-to-conti-gang https://www.trellix.com/en-us/about/newsroom/stories/research/a-royal-analysis-of-royal-ransom.html https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html
RTMhttps://securityaffairs.com/146144/cyber-crime/babuk-ransomware-code-used-10-ransomware.html https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/
RYUKhttps://www.cybereason.co.jp/blog/ransomware/5607/ https://www.group-ib.com/blog/shadowsyndicate-raas/ https://www.trendmicro.com/ja_jp/what-is/ransomware/ryuk-ransomware.html
SAMSAMhttps://cyble.com/blog/cerber2021-ransomware-back-in-action/ https://www.justice.gov/opa/pr/two-iranian-men-indicted-deploying-ransomware-extort-hospitals-municipalities-and-public:
SCARECROWhttps://blog.cyble.com/2022/12/22/new-ransomware-strains-emerging-from-leaked-contis-source-code/
SCHOOLBOYShttps://www.bleepingcomputer.com/news/security/tommyleaks-and-schoolboys-two-sides-of-the-same-ransomware-gang/
SEKHMEThttps://news.sophos.com/ja-jp/2020/12/15/egregor-ransomware-mazes-heir-apparent-jp/ https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
SHAOLEAKShttps://www.guidepointsecurity.com/blog/grit-ransomware-report-october-2022/
SIEGEDSEChttps://socradar.io/the-five-families-hacker-collaboration-redefining-the-game/ https://twitter.com/karol_paciorek/status/1734590357260673170 https://www.sompocybersecurity.com/column/column/hacker-group-launches-ghostlocker-raas
SILENT RANSOM GROUPhttps://cyware.com/news/ransomware-gangs-use-callback-phishing-method-to-target-corporate-networks-ce1b0069 https://www.bleepingcomputer.com/news/security/ransomware-gangs-move-to-callback-social-engineering-attacks/
SLUGhttps://twitter.com/Threatlabz/status/1747729463855751179
SNAPMChttps://www.bleepingcomputer.com/news/security/bianlian-ransomware-gang-shifts-focus-to-pure-data-extortion/ https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/ https://www.nccgroup.com/jp/snapmc-the-non-ransomware-blackmail-attack/
SNATCHhttps://thedfirreport.com/2020/06/21/snatch-ransomware/ https://www.picussecurity.com/resource/snatch-ransomware-gang
SOLIDBIThttps://medium.com/s2wblog/two-copycats-of-lockbit-ransomware-solidbit-and-crypton-7257fb069b16
SPARTAhttps://ke-la.com/wp-content/uploads/2022/11/KELA-RESEARCH_Ransomware-Victims-and-Network-Access-Sales-in-Q3-2022-JA.pdf
SPARTACUShttps://cyble.com/blog/cerber2021-ransomware-back-in-action/ https://www.malwarebytes.com/blog/news/2018/04/spartacus-introduction-unsophisticated-ransomware
SPOOKhttps://medium.com/s2wblog/prometheus-x-spook-prometheus-ransomware-rebranded-spook-ransomware-6f93bd8ab5dd https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
STEELhttps://www.enigmasoftware.jp/steelransomware-sakujo/
STORMOUShttps://cdn.www.gob.pe/uploads/document/file/3290929/Alerta%20integrada%20de%20seguridad%20digital%20N%C2%B0%20168-2022-CNSD.pdf.pdf https://securelist.com/new-ransomware-trends-in-2022/106457/ https://socradar.io/on-the-horizon-ransomed-vc-ransomware-group-spotted-in-the-wild/ https://socradar.io/the-five-families-hacker-collaboration-redefining-the-game/ https://socradar.io/who-is-stormous-ransomware-group/ https://thehackernews.com/2024/03/alert-ghostsec-and-stormous-launch.html https://www.sompocybersecurity.com/column/column/hacker-group-launches-ghostlocker-raas
SUGARhttps://defpr.com/sugar-ransomware/
SUNCRYPThttps://analyst1.com/ransomware-diaries-volume-1/ https://minerva-labs.com/blog/suncrypt-ransomware-gains-new-abilities-in-2022/ https://www.bleepingcomputer.com/news/security/suncrypt-ransomware-is-still-alive-and-kicking-in-2022/
SYNACKhttps://www.bleepingcomputer.com/news/security/synack-ransomware-releases-decryption-keys-after-el-cometa-rebrand/
SZ40https://www.cybereason.com/blog/research/cybereason-vs.-lorenz-ransomware
ShadowSyndicatehttps://www.group-ib.com/blog/shadowsyndicate-raas/
THANOShttp://maruyama-mitsuhiko.cocolog-nifty.com/security/2022/05/post-ea8ab8.html https://www.secureworld.io/industry-news/venezuelan-doctor-jigsaw-thanos-ransomware
THREEAM (3AM)https://www.bleepingcomputer.com/news/security/researchers-link-3am-ransomware-to-conti-royal-cybercrime-gangs/
THUNDER Xhttps://blog.qualys.com/vulnerabilities-threat-research/2021/12/09/ransomware-ranzy-locker
TOMMYLEAKShttps://www.bleepingcomputer.com/news/security/tommyleaks-and-schoolboys-two-sides-of-the-same-ransomware-gang/
TRIGONAhttps://thehackernews.com/2023/12/behind-scenes-of-matveevs-ransomware.html https://therecord.media/trigona-ransomware-group-website-takedown-ukrainian-cyber-alliance https://unit42.paloaltonetworks.jp/trigona-ransomware-update/
TRISEChttps://www.clipeusintelligence.com/post/trisec-a-new-ransomware-actor/
UNDERGROUNDhttps://securityscorecard.com/research/a-technical-analysis-of-the-underground-ransomware-deployed-by-storm-0978/ https://www.fortiguard.com/threat-signal-report/5215/underground-team-ransomware https://www.privacyaffairs.com/underground-ransomware-actor-breaches-11-targets/
VASA LOCKER (BABY)https://cyberint.com/blog/research/babuk-locker/ https://www.trendmicro.com/en_us/research/21/b/new-in-ransomware.html
VICE SOCIETYhttps://research.checkpoint.com/2023/the-rhysida-ransomware-activity-analysis-and-ties-to-vice-society/ https://securityaffairs.co/wordpress/139924/cyber-crime/vice-society-ransomware-custom-locker.html https://socradar.io/threat-profile-rhysida-ransomware/ https://therecord.media/microsoft-ties-vice-society-hackers-to-additional-ransomware-strains/ https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development/
VSOPhttps://blog.cyble.com/2022/08/10/onyx-ransomware-renames-its-leak-site-to-vsop/
WASTEDLOCKERhttps://www.csoonline.com/article/3574907/wastedlocker-explained-how-this-targeted-ransomware-extorts-millions-from-victims.html https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/
WEREWOLVEShttps://twitter.com/alvierid/status/1737763750940151998?s=61&t=cbDfoCunjPFFOy6AuZb1rw https://www.malwarebytes.com/blog/threat-intelligence/2024/01/ransomware-review-january-2024
WHITERABBIThttps://howtofix.guide/white-rabbit-ransomware/ https://securityaffairs.com/155893/cyber-crime/bianlian-white-rabbit-mario-ransomware-joint-campaign.html https://twitter.com/malwrhunterteam/status/1560327142621208577 https://www.crn.com.au/news/amd-claims-potential-attack-from-ransomhouse-gang-582029
X001XShttps://www.insicurezzadigitale.com/en/nuovo-leak-site-nuovo-gruppo-ransomware-ex-rook/
XING TEAMhttps://id-ransomware.blogspot.com/2020/08/cbtucyny-ransomware.html https://twitter.com/LawrenceAbrams/status/1519495698680623104 https://twitter.com/darktracer_int/status/1433694601076822016 https://www.cybereason.com/blog/cybereason-vs.-quantum-locker-ransomware https://www.cybersecuritydive.com/news/ransomware-ryuk-conti-revil-2021/608845/ https://www.tetradefense.com/wp-content/uploads/2021/06/ThreatIntel_May_RoundUp_Compressed.pdf https://www.trendmicro.com/en_us/research/21/j/ransomware-operators-found-using-new-franchise-business-model.html
YANLUOWANGhttps://iototsecnews.jp/2022/09/01/infra-used-in-cisco-hack-also-targeted-workforce-management-solution/ https://www.trellix.com/en-gb/about/newsroom/stories/research/yanluowang-ransomware-leaks-analysis.html
YASHMAhttps://blogs.blackberry.com/ja/jp/2022/06/yashma-ransomware-tracing-the-chaos-family-tree https://medium.com/s2wblog/two-copycats-of-lockbit-ransomware-solidbit-and-crypton-7257fb069b16 https://www.sentinelone.com/blog/deathgrip-raas-small-time-threat-actors-aim-high-with-lockbit-yashma-builders/
ZEONhttps://exchange.xforce.ibmcloud.com/malware-analysis/guid:c0a25a3d60116cf5142da3303876ce16 https://www.sentinelone.com/blog/from-the-front-lines-3-new-and-emerging-ransomware-threats-striking-businesses-in-2022/
ZEPPELINhttps://blogs.blackberry.com/en/2019/12/zeppelin-russian-ransomware-targets-high-profile-users-in-the-us-and-europe https://www.cyfirma.com/news/weekly-intelligence-report-04-oct-2024/ https://www.picussecurity.com/resource/zeppelin-ransomware-analysis-simulation-and-mitigation https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development/
2023LOCKhttps://cyble.com/blog/in-the-shadow-of-venus-trinity-ransomwares-covert-ties/
ARGONAUTShttps://www.cyjax.com/resources/blog/new-argonauts-extortion-group-emerges/ https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/argonauts-group
AZZASEChttps://www.emanueledelucia.net/unveiling-azzasec-ransomware-technical-insights-into-the-groups-locker/ https://www.sentinelone.com/labs/cybervolk-a-deep-dive-into-the-hacktivists-tools-and-ransomware-fueling-pro-russian-cyber-attacks/ https://x.com/MonThreat/status/1808200990035783841
BLING LIBRAhttps://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/
BLUEBOXhttps://www.cyjax.com/resources/blog/phreak-out-new-bluebox-extortion-group-dls-emerges/
BRAINCIPHERhttps://www.group-ib.com/blog/brain-cipher-ransomware/ https://www.sentinelone.com/anthology/brain-cipher/
CHORThttps://www.watchguard.com/wgrd-security-hub/ransomware-tracker/chort
CICADA3301https://www.truesec.com/hub/blog/dissecting-the-cicada
CRYPT GHOULShttps://securelist.com/crypt-ghouls-hacktivists-tools-overlap-analysis/114217/
CYBERVOLKhttps://www.sentinelone.com/labs/cybervolk-a-deep-dive-into-the-hacktivists-tools-and-ransomware-fueling-pro-russian-cyber-attacks/
DEATHGRIPhttps://www.sentinelone.com/blog/deathgrip-raas-small-time-threat-actors-aim-high-with-lockbit-yashma-builders/
ESTATEhttps://www.group-ib.com/blog/brain-cipher-ransomware/ https://www.group-ib.com/blog/estate-ransomware/
FOGhttps://areteir.com/article/malware-spotlight-fog-ransomware-technical-analysis/
FUNKSEChttps://www.cyjax.com/resources/blog/take-me-down-to-funksec-town-funksec-ransomware-dls-emergence/
HELLCAThttps://blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat/ https://cyberpress.org/hackers-claim-massive-breach-of-arrotex-pharma-pus-gmbh/ https://x.com/Ransom_DB/status/1857380735268667561
HELLDOWNhttps://blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat/#h-connection-with-the-ransomware-ecosystem https://detect.fyi/helldown-donex-darktrace-ransomware-fd8683b7d135 https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/helldown
INTERLOCKhttps://www.fortinet.com/blog/threat-research/ransomware-roundup-interlock
JUMPY PISCEShttps://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/ https://unit42.paloaltonetworks.jp/threat-actor-groups-tracked-by-palo-alto-networks-unit-42 https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-187a https://www.threatdown.com/blog/north-korean-apt-targets-us-healthcare-sector-with-maui-ransomware/
KAIROShttps://www.cyjax.com/resources/blog/an-elephant-in-kairos-data-leak-site-emerges-for-new-extortion-group/
KEY GROUPhttps://jp.broadcom.com/support/security-center/protection-bulletin/key-group-targeting-russian-users-with-evolving-ransomware https://securelist.com/key-group-ransomware-samples-and-telegram-schemes/114025/ https://www.sonicwall.com/blog/key-group-russian-ransomware-gang-uses-extensive-multi-purpose-telegram-channel
KILLSEC3.0https://databreaches.net/2024/12/08/is-killsec3-trying-to-extort-victims-using-publicly-leaked-data/ https://thecyberexpress.com/killsec-launches-raas-program/ https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/kill-security
LYNXhttps://unit42.paloaltonetworks.com/inc-ransomware-rebrand-to-lynx/
MAD LIBERATORhttps://news.sophos.com/en-us/2024/08/13/dont-get-mad-get-wise/ https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/mad-liberator
MEGAZORDhttps://www.cynet.com/blog/megazord-ransomware-technical-analysis-and-preventions/ https://www.sentinelone.com/anthology/megazord/
MORPHEUShttps://cyberpress.org/hackers-claim-massive-breach-of-arrotex-pharma-pus-gmbh/ https://www.cyjax.com/resources/blog/the-great-morpheus-new-extortion-group-dls-emerges/
NITROGENhttps://www.esentire.com/blog/nitrogen-campaign-2-0-reloads-with-enhanced-capabilities-leading-to-alphv-blackcat-ransomware https://www.ransomlook.io/group/nitrogen
NULLBULGEhttps://codebook.machinarecord.com/threatreport/34066/ https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/
ORCAhttps://www.cyfirma.com/news/weekly-intelligence-report-04-oct-2024/
PLAYBOYhttps://www.watchguard.com/wgrd-security-hub/ransomware-tracker/playboy https://x.com/DarkWebInformer/status/1850927341867831478
PRYXhttps://www.cyjax.com/resources/blog/data-leak-site-emergence-continues-to-increase/
RANSOMCORTEXhttps://www.halcyon.ai/attacks/ransomcortex-ransomware-hits-painpro-clinics-exposes-patient-data https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/ransomcortex
REBORNhttps://www.group-ib.com/blog/brain-cipher-ransomware/
SAFEPAYhttps://www.huntress.com/blog/its-not-safe-to-pay-safepay
SARCOMAhttps://www.cyfirma.com/news/weekly-intelligence-report-01-nov-2024/ https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/sarcoma
SCRANSOMhttps://www.welivesecurity.com/en/eset-research/cosmicbeetle-steps-up-probation-period-ransomhub/
SEXIhttps://securelist.com/sexi-key-group-mallox-ransomware/113183/ https://www.cyfirma.com/research/tracking-ransomware-july-2024/ https://www.metabaseq.com/threat/babuk-ransomware-behind-the-sexi-campaign/
TERMITEhttps://cyble.com/blog/technical-look-at-termite-ransomware-blue-yonder/
TRINITYhttps://cyble.com/blog/in-the-shadow-of-venus-trinity-ransomwares-covert-ties/
VALENCIAhttps://www.watchguard.com/wgrd-security-hub/ransomware-tracker/valencia
VENUShttps://cyble.com/blog/in-the-shadow-of-venus-trinity-ransomwares-covert-ties/
VOLCANO DEMONhttps://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/ https://www.sonicwall.com/blog/volcano-demon-group-targets-idealease-inc-using-lukalocker-ransomware
DARKRACEhttps://blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat/#h-connection-with-the-ransomware-ecosystem https://cyble.com/blog/unmasking-the-darkrace-ransomware-gang/ https://detect.fyi/helldown-donex-darktrace-ransomware-fd8683b7d135
DONEXhttps://decoded.avast.io/threatresearch/decrypted-donex-ransomware-and-its-predecessors/ https://detect.fyi/helldown-donex-darktrace-ransomware-fd8683b7d135
EL DORADOhttps://socradar.io/dark-web-profile-eldorado-ransomware/ https://www.cyfirma.com/research/tracking-ransomware-june-2024/ https://www.group-ib.com/blog/eldorado-ransomware/
INC RANSOMhttps://unit42.paloaltonetworks.com/inc-ransomware-rebrand-to-lynx/
MALLOXhttps://www.bleepingcomputer.com/news/security/new-mallox-ransomware-linux-variant-based-on-leaked-kryptina-code/ https://www.sentinelone.com/labs/kryptina-raas-from-unsellable-cast-off-to-enterprise-ransomware/
MEDUSALOCKERhttps://blog.talosintelligence.com/threat-actor-believed-to-be-spreading-new-medusalocker-variant-since-2022/ https://cybercx.com.au/cyber-adviser/cyber-adviser-march/ https://unit42.paloaltonetworks.jp/medusa-ransomware-escalation-new-leak-site/
QILINhttps://www.aha.org/system/files/media/file/2024/10/hc3%20tlp%20clear%20threat%20actor%20profile%20scattered%20spider-10-24-2024.pdf
SENSAYQhttps://www.group-ib.com/blog/brain-cipher-ransomware/

MBSD Cyber Intelligence Group (CIG)
吉川孝志