Azzasec

Compare
azzasec logo
Parsing: enabled Known RaaS

View crypto

Description

We are AzzaSec — a decentralized PMC (Private Military Contractor), RaaS (Ransomware-as-a-Service) syndicate, and botnet operator at the intersection of cyberwarfare, asymmetric operations, and underground economics.

Emerging from the collapse of traditional hacktivism, we evolved into a sovereign digital force. We offer custom offensive solutions to clients with political, financial, or strategic objectives. We are stateless, leaderless, and loyal only to code.

Mail1
Mail
azzasec@gtfcy37qyzor7kb6blz2buwuu5u7qjkycasjdf3yaslibkbyhsxub4yd.onion
Tox1
Tox
1EE9CE838741506C3798A00E3E398F427A609D5ED344F60E46489ED48408C123EF41CD0C5C24
Urls1
Url
Status
Screen
Uptime 30d
Health
http://sebzpewd2zz7jap56r37icjee4pn5scss3mjxz74uq32ua2aa3n5vqad.onion Down Screen
0%
Activity (interactive) 3
Activity charts
Posts3
Date Title Description Screen
AzzaSec databreach - LaLiga We've breached LaLiga — the corporate facade behind Spanish football. 1.2GB of internal files are now in our hands. We don't leak. We sell.Contents includes:- Executive emails, contracts, private...... Screen
universitat de barcelona Website link: rnpro01.com.ub.edu Time down: 80h AZZASEC HAS CARRIED OUT CYBER ATTACK ONE DIGITAL INFRASTRUCTURES OF SPAINS UNIVERSITY • The continues powerplay of spain in Ukraine-Russia war has been increased and they are playing with the wwlll. Our attacks caused spain to bleed their digital infrastructures. • We had carried out massive cyber attack on servers of universitat de barcelon. We take responsibility on any outages in the university. Our members with the most powerful attack infrastructures has taken dowm their network. They will have disruption in their mail protocols, Server issues and many more. For now we have attacked for few time but we will come back with more surprises Screen
AzzaSec Leak — www.psc.gov.zw Compromised | Internal Government Files for Sale www.psc.gov.zw — Compromised. We had full access to the Zimbabwe Public Service Commission systems for weeks. No protection, no logging, no clue. We exfiltrated 4.12GB of data: CVs, cover letters, internal HR docs, ministry communications, candidate lists for senior government roles. ID numbers, personal details, hiring decisions — it’s all there. The government has 7 days to pay $200,000 in XMR or the full dump goes public. No negotiations, no contact from state actors. Think we’re bluffing? Check your backups — we have those too. For everyone else: data is for sale. - Non-exclusive sale: $35,000 (Monero only) - Exclusive rights + removal from circulation: $70,000 - Single target queries (by name/email/ID): $4,000 each Serious buyers only. Session and PGP available on request. No forgiveness. No exceptions. If you can’t protect your citizens’ data, we will expose you. — AzzaSec Screen
Note