Azzasec

Parsing : Enabled

Known to be a RaaS

Description

We are AzzaSec — a decentralized PMC (Private Military Contractor), RaaS (Ransomware-as-a-Service) syndicate, and botnet operator at the intersection of cyberwarfare, asymmetric operations, and underground economics.

Emerging from the collapse of traditional hacktivism, we evolved into a sovereign digital force. We offer custom offensive solutions to clients with political, financial, or strategic objectives. We are stateless, leaderless, and loyal only to code.

Mail
azzasec@gtfcy37qyzor7kb6blz2buwuu5u7qjkycasjdf3yaslibkbyhsxub4yd.onion
Tox
1EE9CE838741506C3798A00E3E398F427A609D5ED344F60E46489ED48408C123EF41CD0C5C24
Urls
Screen
http://sebzpewd2zz7jap56r37icjee4pn5scss3mjxz74uq32ua2aa3n5vqad.onion
Screen
File servers
Screen
Chat servers
Screen
Admin servers
Screen

Posts

Date Title Description Screen
2025-04-25
AzzaSec databreach - LaLiga We've breached LaLiga — the corporate facade behind Spanish football. 1.2GB of internal files are now in our hands. We don't leak. We sell.Contents includes:- Executive emails, contracts, private......
Screen
2025-04-24
universitat de barcelona Website link: rnpro01.com.ub.edu Time down: 80h AZZASEC HAS CARRIED OUT CYBER ATTACK ONE DIGITAL INFRASTRUCTURES OF SPAINS UNIVERSITY • The continues powerplay of spain in Ukraine-Russia war has been increased and they are playing with the wwlll. Our attacks caused spain to bleed their digital infrastructures. • We had carried out massive cyber attack on servers of universitat de barcelon. We take responsibility on any outages in the university. Our members with the most powerful attack infrastructures has taken dowm their network. They will have disruption in their mail protocols, Server issues and many more. For now we have attacked for few time but we will come back with more surprises
Screen
2025-04-24
AzzaSec Leak — www.psc.gov.zw Compromised | Internal Government Files for Sale www.psc.gov.zw — Compromised. We had full access to the Zimbabwe Public Service Commission systems for weeks. No protection, no logging, no clue. We exfiltrated 4.12GB of data: CVs, cover letters, internal HR docs, ministry communications, candidate lists for senior government roles. ID numbers, personal details, hiring decisions — it’s all there. The government has 7 days to pay $200,000 in XMR or the full dump goes public. No negotiations, no contact from state actors. Think we’re bluffing? Check your backups — we have those too. For everyone else: data is for sale. - Non-exclusive sale: $35,000 (Monero only) - Exclusive rights + removal from circulation: $70,000 - Single target queries (by name/email/ID): $4,000 each Serious buyers only. Session and PGP available on request. No forgiveness. No exceptions. If you can’t protect your citizens’ data, we will expose you. — AzzaSec
Screen