Ransomware Groups

Track active ransomware operations, dark web infrastructure, and associated threat actors

637
Ransomware Groups

Locky

2 sites2 actors2024
TA505, Graceful Spider, Gold EvergreenDungeon Spider

Crypt Ransomware

1 site2024

Rook

According to PCrisk, Rook is ransomware (an updated variant of Babuk) that prevents victims from accessing/opening files by encrypting them. It also modifies filenames and creates a text file/ransom note (HowToRestoreYourFiles.txt). Rook renames files by appending the .Rook extension. For example, it renames 1.jpg to 1.jpg.Rook, 2.jpg to 2.jpg.Rook.

1 site1 actor2022
Bronze Starlight

The Green Blood Group

1 site2026

Hellogookie

1 site2024

3Am

3 sites1 actor2025
LockBit Gang

Help Restoremydata

1 site2025

Dragonforce

10 sites1 actor2024
DragonForce

Silent Ransom

Agl0Bgvycg

1 site2025

Weyhro

4 sites2025

Clop

The ransomware group known as Cl0p is a variant of a previously known strain dubbed CryptoMix. It is worth noting that this variant was delivered as the final payload in a phishing campaign in 2019 and was exclusively financially motivated, with attacks carried out by the threat actors TA505.<br> <br> At that time, malicious actors sent phishing emails that led to a macro-enabled document that would drop a loader called 'Get2.' After gaining an initial foothold in the system or infrastructure, the actors began using reconnaissance, lateral movement, and exfiltration techniques to prepare for the deployment of the ransomware.<br> <br> After the execution of the ransomware, Cl0p appends the extension '.clop' to the end of files, or other types of extensions such as '.CIIp, .Cllp, and .C_L_O_P,' as well as different versions of the ransom note that were also observed after encryption. Depending on the variant, any of the ransom text files were created with names like 'ClopReadMe.txt, README_README.txt, Cl0pReadMe.txt, and READ_ME_!!!.TXT.'<br> <br> The Clop operation has shifted from delivering its final payload via phishing and has begun initiating attacks using vulnerabilities that resulted in the exploitation and infection of victims' infrastructures.<BR>Source: https://github.com/crocodyli/ThreatActors-TTPs

11 sites3 actors2022
Carbanak, AnunakFIN11+1

Genesis

1 site2026

Zeppelin

Holyghost

1 site2024

Coinbase Cartel

10 sites2025

Ranion

2 sites2025

Xinof

1 site2021

Lulzsec Muslims

1 site2025

Cephalus

2 sites2025

Gwisin

1 site2024

Vaultcrypt

1 site2025

Paradise

Ank

1 site2025
Showing 505 - 528 of 637
Agentic AI · Pentesting

Ready for Agentic Automated Testing?

Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.

Zero false positives
PoC for every finding
30+ tools orchestrated
Setup in 5 minutesSOC 2 & ISO 27001