Ransomware Groups
Track active ransomware operations, dark web infrastructure, and associated threat actors
Snatch
Snatch is a ransomware which infects victims by rebooting the PC into Safe Mode. Most of the existing security protections do not run in Safe Mode so that it the malware can act without expected countermeasures and it can encrypt as many files as it finds. It uses common packers such as UPX to hide its payload.
Kelvin Security
Blackberserk
Meow
Ra Group
Mailto
Kryptina
Taronis
Daixin
Royal
According to Trendmicro, Royal ransomware was first observed in September 2022, and the threat actors behind it are believed to be seasoned cybercriminals who used to be part of Conti Team One.
Rabbit Hole
Insane Ransomware
Hades
According to PCrisk, Hades Locker is an updated version of WildFire Locker ransomware that infiltrates systems and encrypts a variety of data types using AES encryption. Hades Locker appends the names of encrypted files with the .~HL[5_random_characters] (first 5 characters of encryption password) extension.
Ciphbit
Hunters
In mid-October 2023, just a few days before the Europol operation, the source code of the Ransomware Hive was sold, along with its website and older versions developed in Golang and C (although this purchase has only been reported by the actors without concrete evidence). The buyer of this new source code was the group Hunters International, who claimed to have fixed the bugs in the Ransomware Hive that were responsible for preventing file decryption in some cases. The group also stated that file encryption would not be their primary focus; instead, they would use data theft as a method to pressure victims during extortion attempts.
Elpaco
Lapsus$
Avoslocker
Wiper Leak
Blackbyte
Ransomware. Uses dropper written in JavaScript to deploy a .NET payload.
Ransomexx
RansomExx is a ransomware family that targeted multiple companies starting in mid-2020. It shares commonalities with Defray777.