Ransomware Groups

Track active ransomware operations, dark web infrastructure, and associated threat actors

637
Ransomware Groups

Leakeddata

2 sites2026

Egregor

2 sites2 actors2025
Mallard SpiderTA2101, Maze Team

Cipherwolf

1 site2026

Rustylocker

10 sites2025

Dispossessor

This is not a ransomware group but a data broker

6 sites2024

Unknown

2 sites2021

Elcometa

Bober

1 site2025

Gandcrab

1 site1 actor2024
Pinchy Spider, Gold Southfield

Samsam

1 actor
Boss Spider, Gold Lowell

Raznatovic

RANSOMED.VC aka Raznatovic

2 sites2024

Ransomcortex

1 site2024

Lolnek

8 sites2022

Dark Shinigami

1 site2025

Monte

1 site2022

Satancd

1 site2026

Obsidian Orb

Darkrypt

1 site2025

Pear

Pure Extraction And Ransom (PEAR) Team is the community of highly responsible and strictly disciplined members. We are a private team and have nothing common with any other threat actors. We've been monitoring this field for a long-long time. So, we understand all the processes and know well how it all works.

8 sites2026

8Base

The 8base Ransomware group made its first appearance in early March 2022, remaining somewhat quiet after the attacks. This group operates like other ransomware actors, engaging in double extortion. <BR> However, in mid-May and June 2023, the ransomware operation saw a spike in activity against organizations from various sectors, listing 131 organizations in just 3 months.<BR> The 8base data leak site was created and made available in March 2023, claiming honesty and simplicity in its discourse.<BR> VMware published a report on 8base, drawing some similarities with the ransomware group `RansomHouse`, pointing out resemblances such as the website used by 8base and the ransom notes presented in its attacks.<BR> Interestingly, the 8base Ransomware group does not have its own ransomware developed by the group. Instead, the actors took advantage of other leaked ransomware builders to customize the ransom note and present it to the victim organization as 8base's operation.<BR>Source : https://github.com/crocodyli/ThreatActors-TTPs

4 sites2023

Babyduck

1 site2021

Nefilim

According to Vitali Kremez and Michael Gillespie, this ransomware shares much code with Nemty 2.5. A difference is removal of the RaaS component, which was switched to email communications for payments. Uses AES-128, which is then protected RSA2048.

1 site1 actor2021
Traveling Spider

Bqtlock

1 site2026

Worldleaks

World Leaks emerged in January 2025 as a rebrand of the Hunters International ransomware operation, shifting its focus from file encryption to solely stealing sensitive data and threatening to leak it unless a ransom is paid

1 site2026
Showing 289 - 312 of 637
Agentic AI · Pentesting

Ready for Agentic Automated Testing?

Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.

Zero false positives
PoC for every finding
30+ tools orchestrated
Setup in 5 minutesSOC 2 & ISO 27001