B0 Group

Description

B0 is a relatively obscure ransomware operation with very limited public reporting outside of leak site monitoring. It appears to operate a data-extortion model, with a dedicated leak site on the Tor network, and no confirmed use of encryption-based ransomware in documented incidents. The group is listed in ransomware tracking services from at least mid-2024, but there are no major vendor reports describing their victimology, intrusion methods, encryption schemes, or specific targeting patterns. Its branding and operational style suggest a small, self-contained group rather than a large RaaS platform.

External Analysis
https://www.porthas.com/blog/b0-ransomware-decryption/
Mail
b0@mail2tor.co
Tox
E3B88B09D68CF0AE576BC843D000300ED939068E473D952FF7F1C1B2D2465D7D082117729A3B
Urls
Screen
http://bzsn5crutf7eiq5mlohn2n2lkaqcafp6tsr6g5b3y4rxbq4g32bg3uid.onion/
Screen
File servers
Screen
Chat servers
Screen
Admin servers
Screen