Group profiles

0Mega

Description

0mega is a ransomware group first observed in May 2022, operating with a double extortion model: * Encrypting victim files (adding the .0mega extension) * Threatening to leak stolen data if ransom demands are not met. Ransom notes are named DECRYPT-FILES.txt and include victim-specific details and a Tor-based negotiation portal. Unlike typical Ransomware-as-a-Service (RaaS) operations, 0mega appears to work as a closed group, selecting a limited number of high-value targets. The group employs two main tactics: * Traditional ransomware encryption of on-premise systems. * Cloud-based extortion, compromising Microsoft 365 Global Admin accounts, creating unauthorized admin users, and exfiltrating data via SharePoint. Active period: May 2022 – January 2024

parsing : enabled

Links

Page title Available Last visit URL Screen
0mega | Blog
⬇️
2025-05-29
http://omegalock5zxwbhswbisc42o2q2i54vdulyvtqqbudqousisjgc7j7yd.onion/ Screen
⬆️
2025-08-20
https://0mega.cc/ Screen
0mega | Blog
⬇️
2024-10-31
https://0mega.ws/ Screen
⬇️
Never
http://kbavsfyafrpsostfrkg2w2f7ttf55sz3pfqmoza3o2t3mhrdalvdu7yd.onion

2023Lock

Description

2023Lock is a ransomware strain first observed in January 2024, believed to be an evolution of the Venus and Zeoticus families and a direct precursor to the later TrinityLock variant. It employs a hybrid encryption method combining XChaCha20 and curve25519xsalsa20poly1305, appending the “.2023lock” extension to encrypted files. Upon infection, it delivers ransom notes in HTML, TXT, and HTA formats containing decryption instructions. Unlike many modern ransomware groups, there is no evidence that 2023Lock engages in double extortion or data exfiltration, operating purely through file encryption to pressure victims into payment. Its codebase and operational patterns strongly align with TrinityLock, which emerged a few months later with more sophisticated extortion tactics.

Links

Page title Available Last visit URL Screen

3Am

Description

3AM, also known as ThreeAM, is a relatively new ransomware family that emerged in late 2023, initially deployed as a fallback option when LockBit infections failed. Written in Rust for 64-bit systems, it appends the “.threeamtime” extension to encrypted files and tags them with the marker “0x666,” while deleting Volume Shadow Copies to hinder recovery. 3AM operators use a double extortion strategy, combining file encryption with data theft and threats to leak stolen information. More recent campaigns have shown increased sophistication, incorporating email bombing followed by vishing calls to convince victims to grant remote access via Microsoft Quick Assist. Attackers then deploy virtual machines containing backdoors, allowing them to remain undetected while exfiltrating data before attempting to launch the ransomware payload.

parsing : enabled

Links

Page title Available Last visit URL Screen
Verify
⬆️
2025-08-20
http://threeamkelxicjsaf2czjyz2lc4q3ngqkxhhlexyfcp2o6raw4rphyad.onion Screen
403 Forbidden
⬇️
2025-01-09
http://ulkvlj5sirgrbnvb4hvbjo2ex2c2ceqe2j4my57fcdozpbq5h5pyu7id.onion Screen
Enter the key
⬆️
2025-08-20
http://threeam7fj33rv5twe5ll7gcrp3kkyyt6ez5stssixnuwh4v3csxdwqd.onion/ Screen

8Base

Description

8Base emerged in early 2022 and rapidly escalated its ransomware operations by mid-2023, positioning itself as a “simple pen tester” while executing a relentless double-extortion scheme: encrypting files using AES-256 CBC mode (appending the “.8base” extension) and threatening to leak stolen data via a Tor-accessible leak site. The group leverages initial access methods such as phishing and SmokeLoader, disables security mechanisms like Volume Shadow Copy and firewalls, and deploys persistence via registry and startup entries. Targeting primarily small and medium-sized organizations across sectors such as manufacturing, finance, IT, and healthcare in regions including the U.S., Brazil, and Europe, 8Base has drawn comparisons to Phobos and RansomHouse for its tactics and ransom-note style. In early 2025, international law enforcement operations disrupted the group, resulting in the arrest of four key actors, seizure of servers, and warnings to hundreds of potential victims.

parsing : enabled

Links

Page title Available Last visit URL Screen
Home
⬇️
2023-10-30
http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/ Screen
This site has been seized
⬇️
2025-08-20
http://xb6q2aggycmlcrjtbjendcnnwpmmwbosqaugxsqb4nx6cmod3emy7sad.onion Screen
Home
⬇️
2024-11-30
http://92.118.36.204/ Screen
This site has been seized
⬆️
2025-08-20
http://xfycpauc22t5jsmfjcaz2oydrrrfy75zuk6chr32664bsscq4fgyaaqd.onion/ Screen
⬇️
Never
http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/contact

A1Project

Description

The locker is written in C/C++/ASM. It supports all systems starting from Windows 2003, has a separate binary for ESXi, and uses a unified encrypted file format across all systems. WINDOWS: • Two encryption modes: patch-based and file header. • Extensive configuration settings: from ignoring specific paths/extensions to terminating services/processes, unlocking occupied files, working with network shares, and more. • Arguments available for shutting down Hyper-V virtual machines, deleting backups, network scanning with logged-in user tokens. • Each build includes an obfuscated PowerShell script. • Execution is password-protected. • The locker itself is shellcode for x86/x64; if you have custom execution methods, we can provide the shellcode. ESXI: • Encrypts files in patches, with configurable path exclusions. The default configuration is pre-set to avoid disrupting Windows/ESXi/Linux systems. Our commission is 20% of payouts

Links

Page title Available Last visit URL Screen

Abrahams_Ax

Description

Abrahams_Ax, first observed in November 2022, is not a Ransomware-as-a-Service (RaaS) operation but a politically motivated hacktivist persona. The group is linked to the Iranian-associated threat actor COBALT SAPLING, which previously operated as Moses Staff. It uses double-extortion tactics focused on stealing and leaking sensitive data rather than encrypting files. Infrastructure, visual branding, and operational patterns strongly resemble those of Moses Staff, suggesting a shared origin. Its most notable incident was the breach of the Saudi Arabian Ministry of Interior, where stolen data was published alongside propaganda content. The group’s targeting appears to align with Middle Eastern geopolitical interests, particularly against Israeli- and Saudi-linked entities. No encryption methods or file extensions are publicly documented, as encryption is not part of their operations.

Links

Page title Available Last visit URL Screen
Database Error
⬇️
2024-02-09
http://abrahamm32umasogaqojib3ey2w2nwoafffrguq43tsyke4s3fz3w4yd.onion/ Screen

Abyss-Data

Description

Abyss‑Data, also known as Abyss Locker, is a ransomware operation first identified around March 2023. It conducts double extortion by exfiltrating data and encrypting systems—particularly targeting VMware ESXi virtual environments—then threatening to leak stolen data via a TOR-based leak site if ransom demands aren't met. The group’s Linux variant derives from the Babuk ransomware source code with encryption resembling HelloKitty, using ChaCha–based ciphers. On Windows, Abyss Locker encrypts files (typically appending “.abyss” or randomized extensions), deletes Volume Shadow Copies, manipulates boot policy to disable recovery, and delivers ransom notes (e.g., WhatHappened.txt), often replacing the desktop wallpaper as part of its extortion tactics. Its campaigns have targeted diverse industries—finance, healthcare, manufacturing, technology—across multiple regions, with victim lists prominently featuring organizations in North America.

parsing : enabled

Links

Page title Available Last visit URL Screen
Abyss-data
⬆️
2025-08-20
http://3ev4metjirohtdpshsqlkrqcmxq6zu3d7obrdhglpy5jpbr7whmlfgqd.onion Screen
Hello
⬆️
2025-08-20
http://ufvi7hpcawesdklmommeeq4iokhq2km4hay3dwh4rirth5xaomle35id.onion/ Screen
⬇️
2025-02-19
http://t7ogwvu74a6flssns55yv7zw2xvssqbhrdbxqrwbahumyzwklnvqayid.onion/ Screen
⬇️
2025-02-19
http://gmxnejtsg3uiwopmnsooxbi3p2nukwemkvm7bg44tgbbnuuuyofqjfyd.onion/ Screen
⬇️
2024-10-17
http://jtjz6utbmabwcatyomwxaeum7ey7nxs7yooqflxhctnksjqsnammonqd.onion/ Screen
⬇️
2024-10-17
http://2mhkqjcw4auxop7auchz2iijcbj63qccwodtokofbb2ul5oejkkt6xyd.onion/ Screen
⬇️
2024-10-17
http://wka7ma7rzgmzmtn65dhv5zp5p6e3uv5sydnns7xsf6kpf7noukhchhqd.onion/ Screen
⬇️
2025-02-19
http://l3yeoyhnphtymqua5env7qitedmqv5ahe7waxgndwa64z2c2h3cjjhqd.onion/ Screen
⬇️
2025-02-19
http://2j45tydxcvm44jbyr6krhx77rzey3jtif5qdjak2gik4usoljvvhqaid.onion/ Screen
⬇️
2024-10-17
http://cuft7z2xlfogrtx4ddqnjqyerye2qtagksow2fip4xbb5iw7dsgtvhqd.onion/ Screen
⬇️
2025-02-19
http://wyz32kscr2ythqpyjwqfxcaxn5576fdurr7jag44gggnmi4cvhykhvid.onion/ Screen
⬇️
2024-10-17
http://3pb6cefz6hubgyb2ph7ua7yjzjpxwapbbp5zomz7xmvrjhjfykjwu6id.onion/ Screen
⬇️
2025-02-19
http://kn4spxunete4ddz7375i2wpnj4vvkir7wdmcg2pc5yod56lmb54nbayd.onion/ Screen
⬇️
2024-10-17
http://2ikvareyuw2wjnc4vb5yteq7d2tkg6k3gevnixzqtkn3cpvej6ajj4yd.onion/ Screen
⬇️
2025-02-19
http://wflff64dxxqvfhd7poarkvkphmibdjyyhv7h4zqo5m52ggsgncmbrbqd.onion/ Screen
⬇️
2025-02-19
http://frheu6drsqpehmuyrdxdrfu5bzqwxps4zlmnuxlcnxskwxcwqsyhwxyd.onion/ Screen
⬇️
2025-02-19
http://kceqbaoxmx2czutxty3mq35m5mv46dq66hpszrhbhduj7uwhu6ax3qad.onion/ Screen
⬇️
2025-02-19
http://4nsmlpz4qceow7bfrmarxdqaj7chcqobin3mzb27uhscb2yvjs6j4xqd.onion/ Screen
⬇️
2025-02-19
http://nka6xgyyu77ksb5xmmovp4en2hrkg53mfq2osql526oe7nybnlggfgid.onion/ Screen
⬇️
2025-02-19
http://mflnjnwfinorxxsgkyfel3fqanbtbbrl5k5mqqjwmrf7o3jc6a4hy3id.onion/ Screen
⬇️
2025-02-19
http://jtt4lqatjtrj5hxxi33dczkluouf5wivzdmy4v62dnhipk6ixk5mktad.onion/ Screen
⬇️
2025-02-19
http://udugclljnfcx34amtpddkjggmkfqci5xnlfef2hqtxstufulo3pvauid.onion/ Screen
⬇️
2025-02-19
http://vmmefm7ktazj2bwtmy46o3wxhk42tctasyyqv6ymuzlivszteyhkkyad.onion/ Screen
⬇️
2025-02-19
http://cfev2mvlqooohl3af2upkgu3ju4qcgqrrgh6sprfxkgh3qldh2ykxzyd.onion/ Screen
⬇️
2025-02-19
http://2fzahjlleflpcyecd245xe3q6tczjkwzcm4fbhd4q4bsun45y2csyayd.onion/ Screen
⬇️
2025-02-19
http://wpefgvpyuszr4vg444qed734big233itylqclte7usszbdbfyqvb2lqd.onion/ Screen
⬇️
2025-02-19
http://gvzbeu532wwxqze3v3xcxpsbhpvwusnajzahi55dqklbunzgjp5wchad.onion/ Screen
⬇️
2025-02-19
http://ieelfdk3qr6as2u5cx3kfo57pdu6s77lis3lafg5lx5ljqf2izial6ad.onion/ Screen
⬇️
2025-02-19
http://yuhflx7yjk52jedcrtb3ne235mmykqfwc6jarby7lxxgv26ep7x4qjqd.onion/ Screen
Hello
⬆️
2025-08-20
http://zngbsq66uwem4qzyxpqb5rjo2xebnbwdku27nhmquryx6ljnbbedhiad.onion/ Screen
Hello
⬆️
2025-08-20
http://ub63kcmphxbm3m64wwhuznbxfap4hlgqtauhnf4rvz23cdnrqr4towid.onion/ Screen
Hello
⬆️
2025-08-20
http://s5v5hvtk3oyxg3m6afgxeuwlasqku3adeosv7kwwjfvhf22vqiwotrqd.onion/ Screen
⬇️
Never
http://jqlcrn2fsfvxlngdq53rqyrwtwfrulup74xyle54bsvo3l2kgpeeijid.onion/
⬇️
2025-02-19
http://bgifgvekggqjfqx6x45e24vq7nm6in54rk36fo6jg4qf3yvy6lfisgid.onion/ Screen
Hello
⬇️
2025-08-20
http://yehbrr7tnzrcpcq2fglrf73ug2jqhgngxnyv3clyhrswdwmg45p7fyad.onion Screen
Hello
⬆️
2025-08-20
http://46vfmzfh3uxc3ojn6z267jmiytfhxzq4x7vvnqtycu5wa6hh3jl2hjyd.onion/ Screen
Hello
⬇️
2025-08-20
http://tycacxbqdhohowofueufbnekscyomymoxbr4wlim5cqpfv72z6popcid.onion/ Screen
Hello
⬆️
2025-08-20
http://y7fupmz3lx64ilnyvxbu73xigzdtc6fl2aee2duuf546duoo4nurv2id.onion/ Screen
Hello
⬆️
2025-08-20
http://7lpodmzejui2scqfojx3voadc7fgrt2igww6ipjtnztfg6hprnmel5yd.onion/ Screen
Hello
⬇️
2025-08-20
http://toczr6bmtfbgardwgcgbeqntumkxi3y2tsfbcstybf6xknd6cm6e32ad.onion/ Screen
Hello
⬆️
2025-08-20
http://euujzkwziy777bg4oyiks2x3s5cxlydao6jhpilzdjmjohja3s4v7jid.onion/ Screen
Hello
⬆️
2025-08-20
http://vnsggttwhcofyeh3nxoynxtg5mk5xl4cd7e3c4x62aqb2rj4rfjh3eqd.onion/ Screen
Hello
⬆️
2025-08-20
http://ah73jnvhuoznb4n3srbtspsgrdyyde2xszywcjryjroz4wixhwmdrjad.onion/ Screen
Hello
⬆️
2025-08-20
http://l7f3ny5yedcm7zhgxzy34mihk6jvgwg7m6qj3cqw4nvky7xv5wttegyd.onion/ Screen

Adminlocker

Description

AdminLocker was first observed around December 2021 and appears to be a lone operator or small group, with no clear Ransomware-as-a-Service (RaaS) model reported. It uses single-extortion tactics—encrypting files without publicly documented data exfiltration—primarily targeting enterprise and personal systems via methods such as malicious email attachments, cracked software installers, P2P downloads, and malvertising. The ransomware employs symmetric and asymmetric encryption (likely AES combined with RSA) to lock files, appending extensions such as .admin1, .admin2, .admin3, .1admin, .2admin, and .3admin; victims receive a “!!!Recovery File.txt” ransom note with instructions to pay via Tor and Bitcoin. Notable for its multiple simultaneous variants with varied extensions, it reportedly allows victims to decrypt up to five small files as “proof” before demanding ransom. No high-profile sector- or region-specific campaigns are publicly documented.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://adminavf4cikzbv6mbbp7ujpwhygnn2t3egiz2pswldj32krrml42wyd.onion

Agl0Bgvycg

Description

This ransomware group (notably stylized as aGl0bGVyCg) has extremely limited publicly available information. No confirmed active period is documented, nor is there evidence of whether it operates as a RaaS (Ransomware-as-a-Service). Similarly, there is no known data about its extortion type (single or double), preferred targets, intrusion methods, encryption techniques, file extensions, or ransom note behavior. The only identifiable detail is the blog URL hitleransomware.cf, which appears to serve as its public-facing leak or command-and-control site. Overall, public threat intelligence remains too sparse to draw even basic conclusions beyond the existence of the blog site.

Links

Page title Available Last visit URL Screen
Error Response Page
⬇️
2025-02-23
http://hitleransomware.cf Screen

Ailock

Description

AiLock is a Ransomware-as-a-Service (RaaS) group first identified in March 2025. It employs a double-extortion approach—encrypting files and threatening to report breaches to regulators or share stolen data with competitors if the ransom isn’t paid. Victims have just 72 hours to respond and up to five days to pay; failure to pay results in data leaks and destruction of recovery tools. The ransomware appends the extension .AiLock to encrypted files, changes file icons to a green padlock with the “AiLock” name, and replaces the desktop wallpaper with a distinctive robot-skull logo. It employs a hybrid encryption scheme, combining ChaCha20 for file encryption with NTRUEncrypt for securing metadata, and uses a multi-threaded design (path-traversal and encryption threads with IOCP) for efficiency. While active campaigns and leak sites are confirmed, specific sectors, regions, and intrusion methods remain undisclosed in public sources.

Links

Page title Available Last visit URL Screen
Support chat
⬇️
2025-03-14
http://jaawqs6wu56n2adj7qrjg25dhcux2nislvjouffpzldj23e4y72akoid.onion Screen
Hello
⬆️
2025-08-20
http://vnsggttwhcofyeh3nxoynxtg5mk5xl4cd7e3c4x62aqb2rj4rfjh3eqd.onion Screen

Akira

Description

Akira is a ransomware group first observed in March 2023, targeting both Windows and Linux environments, with a particular focus on corporate networks and VMware ESXi servers. The group employs a double extortion model, stealing sensitive data before encrypting systems and threatening to leak it on a Tor-based leak site if ransom demands are not met. Akira typically gains initial access through exploitation of unpatched VPN services, compromised RDP credentials, phishing, or abuse of legitimate remote administration tools. Its Windows variant uses the Windows CryptoAPI to encrypt files, appending the “.akira” extension while skipping critical system folders to maintain system stability. Ransom demands have ranged from $200,000 to over $4 million, typically requested in Bitcoin, and the group has been linked to high-profile incidents affecting education, manufacturing, and healthcare sectors. Akira appears to operate independently rather than as a Ransomware-as-a-Service, and continues to evolve, with recent variants improving encryption speed and evasion techniques.

parsing : enabled

Links

Page title Available Last visit URL Screen
⬆️
2025-08-20
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/ Screen
/
⬆️
2025-08-20
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/ Screen
⬇️
2025-08-20
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/l Screen

Ako

Description

First observed in early January 2020 (initial victim post on January 9, 2020), Ako (also known as MedusaReborn) operates under a Ransomware-as-a-Service (RaaS) model, with daily beta builds reportedly offered for affiliates. It uses a double-extortion approach—encrypting files and exfiltrating data, with subsequent threats to leak the data via a dedicated leak site. Delivery primarily occurs via malspam, often through password-protected ZIP attachments containing malicious .scr executables. After compromise, it deletes shadow copies and disables recovery, then encrypts files—excluding certain extensions—and appends random six-character suffixes, dropping files like ako-readme.txt and id.key. Encryption is carried out using unspecified algorithms, but its behavior aligns closely with MedusaLocker variants. Known targets include networked Windows environments, potentially across multiple sectors. No notably high-profile or geographically specific incidents are detailed.

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion
⬇️
Never
http://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion/

Alphv

Description

ALPHV, also known as BlackCat or Noberus, is a ransomware family that is deployed as part of Ransomware as a Service (RaaS) operations. ALPHV is written in the Rust programming language and supports execution on Windows, Linux-based operating systems (Debian, Ubuntu, ReadyNAS, Synology), and VMWare ESXi. ALPHV is marketed as ALPHV on cybercrime forums, but is commonly called BlackCat by security researchers due to an icon of a black cat appearing on its leak site. ALPHV has been observed being deployed in ransomware attacks since November 18, 2021. ALPHV can be configured to encrypt files using either the AES or ChaCha20 algorithms. In order to maximize the amount of ransomed data, ALPHV can delete volume shadow copies, stop processes and services, and stop virtual machines on ESXi servers. ALPHV can self-propagate by using PsExec to remote execute itself on other hosts on the local network.

parsing : enabled

Links

Page title Available Last visit URL Screen
THIS WEBSITE HAS BEEN SEIZED
⬇️
2024-06-25
http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion Screen
Start-maximized.com
⬇️
2022-04-09
http://2cuqgeerjdba2rhdiviezodpu3lc4qz2sjf4qin6f7std2evleqlzjid.onion
404 Not Found
⬇️
2024-06-25
http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/api/blog/all/0/6 Screen
THIS WEBSITE HAS BEEN SEIZED
⬇️
2024-06-25
http://vqifktlreqpudvulhbzmc5gocbeawl67uvs2pttswemdorbnhaddohyd.onion/ Screen
THIS WEBSITE HAS BEEN SEIZED
⬇️
2024-03-09
http://alphvuzxyxv6ylumd2ngp46xzq3pw6zflomrghvxeuks6kklberrbmyd.onion Screen
⬇️
Never
http://d75itpgjjfe2ys2qivqplbvmw3yyx7o5e4ppt2esit2lluhngulz4hqd.onion/
⬇️
Never
http://sty5r4hhb5oihbq2mwevrofdiqbgesi66rvxr5sr573xgvtuvr4cs5yd.onion/
⬇️
Never
http://xnsbsjciylsg23zfmrv6ocuyh7ha5zexeouchlr3zsi5suda4arpeyqd.onion/
⬇️
Never
http://24y6h7fwi2fvlv2kuzudyiumjqz4rgqcml2wr7te6ugcgt6qatqe64yd.onion
⬇️
Never
http://2plv344u23ebuayurqcfbjbnxpqzqknja3ca7ulbnnwtgb6tpmqqsvid.onion
⬇️
Never
http://2udgodqyt6jn7s7cb7n66kaisg7i6gxo5n64tnvlk7dee4d4rguojbid.onion
⬇️
Never
http://3bkgnqvrdlzib4t62oyo22eqljdrjaxtwcsvgwystog6yiyx7j7b7nad.onion
⬇️
Never
http://3fgntkytua2jb7rarvuchns6ka7tfh3uc6ypub3ffepjq3jekb3eypyd.onion
⬇️
Never
http://3g7cqn66j3uwes7jah744u6fzuzymvnlubn67624jwvswoollqkjtzqd.onion
⬇️
Never
http://3id2g6u3dwvg7nsarfkgsdf3odp5hb7owvnoqbipbisekudptetuxtad.onion
⬇️
Never
http://3kqfll43jsj7boglorh5xntudnynlk6howi6ks543cctlrnid4dzwdad.onion
⬇️
Never
http://3md3it5uxkebudflmlratms66jvwkrdphzoo4nzsvwh63niqpz42aeyd.onion
⬇️
Never
http://3oz6naflgy7gbtc4psqumk4dd7meq37tjxw7qxhytuiysyq3632xgsqd.onion
⬇️
Never
http://3s5pzwlqllrzz4xlluholmqgueje7lutlugbdnwa3ehbedrxaq5wjbad.onion
⬇️
Never
http://3xa42kwkeiwzhjybddfeifad7vn2kvsslybquledvib5xsfkylwtwyid.onion
⬇️
Never
http://425yxsnocj47lwgueymn7y4y4vrphccooa3diabzoqdl6cslxriqxrqd.onion
⬇️
Never
http://4kfzqzfci7uqpgngrosuukgj2dr745cyqgenbaojycdykgxipabnyqyd.onion
⬇️
Never
http://4mncnm5bl3jfotcgrn7zv2uznfzs2oo4sahwrlqvwcd265x6jdudkcid.onion
⬇️
Never
http://4qmsi7vcdrrutxapxbc7eofjjzfsvam3fehgmk6xyivwcroqkqjij5qd.onion
⬇️
Never
http://5e2q3uzczl3bur23dxfxxu5unlukuqrlseesmxc7v7dmo4qgbr3kaxqd.onion
Oshi - Anonymous file storage
⬇️
2025-05-23
http://5ety7tpkim5me6eszuwcje7bmy25pbtrjtue7zkqqgziljwqy3rrikqd.onion Screen
⬇️
Never
http://5hhrba7et452bt3ttwqewumlua5t3vyyr27iomrv2o3ae6of3l7hghad.onion
⬇️
Never
http://5igait2ocdf7kfktyemdgdl6cot43ryecr5ycqid6drydhpuzibu54qd.onion
⬇️
Never
http://5rosrz5d53usc6p7s7qjvvcqv4bbedvpjsv3dzls7kuend2i65s7peqd.onion
⬇️
Never
http://6lbwfgybggslvhkbsfqo427sqnfhutb65wmhvj5qlko32farj6w45qid.onion
⬇️
Never
http://73tzbwujmnmz35k74eclnhlkwmnjrlmfeut3udxwnfsc53kg2kvdpead.onion
⬇️
Never
http://752ezjq6t4pwdtrwviimap3wlzqm2qzd6hh2rwffzq3d2urw3o7xa6qd.onion
⬇️
Never
http://7pwwm7j5w5gjgs7nibha6dqknqliiwqvimkkja7zdgmozx2ikjtfigad.onion
⬇️
Never
http://a5ciw2q5jijci5wj63s47zpul7bq3n36ng2qncta24yc6bsmkhoeg2ad.onion
⬇️
Never
http://acvhxy4cc52a7iv7ugc4eq6dq6nus2s5xduew7s2wkaw6nhftasyq2yd.onion
⬇️
Never
http://afl6q5mjgzgm765wfneiojktyppxbhkclhghfgcfpvr2nmadczqs4sqd.onion
⬇️
Never
http://ajdtbop62plz3s2uw3rjtegilw4lfmixl7h4p6oset5rq5jihwtehtad.onion
⬇️
Never
http://amo6c37dbe2bkgpopymaqms4vusn7kafqxy7pgqk2etengd76xk5w3ad.onion
⬇️
Never
http://arzaonkha4jubxjgg47dkjjz42ol72wmwvjmtz47a33box2gupk2v4ad.onion
⬇️
Never
http://bjiztkvfzboiiggfnf3pctsyllq6fy6rmllxbq4rk7uyd3w4eh2snpad.onion
Index of /
⬇️
2024-12-15
http://bmebpteoa53k76zoiafykh4axr4kzbx7jn2djvdrdde4r57bckkfxsyd.onion Screen
⬇️
Never
http://boq6yg6a523cqjbsu7nwjscakdpnjlyytapnodmmimh63kq7r3l3hmyd.onion
⬇️
Never
http://bq67odzyhxshp3vcvdvau4xosn54rmudy3dzqlmm2hkd3m4b2qackcad.onion
Index of /
⬇️
2024-12-15
http://bvn5r7dzfdn2k2wcv7ifwtvi37zsm5kxv776nqw5lh7hwr4gd7msyhyd.onion Screen
⬇️
Never
http://c5ic3pm46hytw4r47z6t6yxsffndo52lcitf5sgauwyrqmsjfb4etdqd.onion
⬇️
Never
http://cffb3fd2sofyiemffnzy7jjbuq7la3nftexl26574q3xkw5ycqf2r3id.onion
⬇️
Never
http://cfj4bsnfi4ktpfoei7uqggz5sb443fhvvbkxbmu3dhfriomg2txxgxid.onion
⬇️
Never
http://chygou6fs4nu2r56ncfd3crjb62s6sysulg7y7ds2tbdoa4d3wcwrdyd.onion
⬇️
Never
http://civmwfeogouzf27jldj2buu3ihmpooupjhfbdgdth6maptrntim6oiid.onion
⬇️
Never
http://d2abffaqhce6cbnlrdcsb3iafxhr5iqmezpfoxkpx3zf5j7tngqdskid.onion
⬇️
Never
http://dcoezwwwxij2trzd3oqhtyjg3lgvgzmyzrj2pcs3rdfh4tl5267dwpyd.onion
⬇️
Never
http://dgxxqqhvob4cvriyy2rdiwgyvuqewwsq4tbq7rnk5ulqh6zvroutvpyd.onion
⬇️
Never
http://doh3rlqtvg24yu4r4w7bk5twm7w6nm7wqsr3d3roc7jisrdqf5catnad.onion
⬇️
Never
http://dr2tr76ftudjccp4zc7fks5lhk3pg3rifl3rcc36bgm46sfivkq2sfqd.onion
⬇️
Never
http://dx2g4nm4ouhpqd6c6ttkzbnsliw3empzrwej3ilbwo6zz4g5rcgeazid.onion
⬇️
Never
http://e2ejecjvrpik5bjbvdczu7bjww4epxzsyz3nl7f52oe5pi43ddcsixid.onion
⬇️
Never
http://elcurwunjxjhx24aud6p47htzrrkxvbispdacsatsumlunagoylbgwad.onion
⬇️
Never
http://eyeeabnztw7jphcloghjraqihvon5pgo3gegsgypkg3cxn6jhg4wq5yd.onion
⬇️
Never
http://fafuye3k6sfv4t4nkr2vje5s523q6hfego5cwlze6gdntvxgnjebqnid.onion
⬇️
Never
http://fbehz3443h644jrcu3djvexhplhmnijilkq54puzrxuvloc42oykgiad.onion
⬇️
Never
http://g5a2thsvpabyjp6prphsque7nyaauul4rryr2nulytakggkecls23bad.onion
⬇️
Never
http://ga6pe777wjfk6xuhkepqtfldiqjx253an7dofzmyrlwzgqipqgtwwtyd.onion
⬇️
Never
http://gevvr5kripac4p52ixiq3ufnkr4qasn64r5d7fsyu3kk2zmuyarbvdad.onion
⬇️
Never
http://gjv7s67txrkdxftyfyt2xpcqkp76bmy7eqlumhmile6z6z2y23jkpkad.onion
⬇️
Never
http://hdyacvmmr4x2ms5tg4w5vnqzxfnlat4iosbmf7qz5xxoumnqfrcv2wqd.onion
Welcome | SecureDrop | Protecting Journalists and Sources
⬆️
2025-08-20
http://he5dybnt7sr6cm32xt77pazmtm65flqy6irivtflruqfc5ep7eiodiad.onion Screen
⬇️
Never
http://hut4icumte4mphbzuk7cycppiubjdzfpilgsdku6vydrn7kg7y5f6oad.onion
⬇️
Never
http://i3jwvuhloergmbeimztm6btpjzshvvcaqj2qrweeehcjhf37tndxtoqd.onion
⬇️
Never
http://ieflygyfoezms2wshjpfyfz4hpyxjcdtxejntysvopd7n7cmmnucbkad.onion
⬇️
Never
http://ijmyrvd3ntbdu22auxpgiiblzxplfw6xqpdztoosfrbqiznymayxfsyd.onion
⬇️
Never
http://irn7otydieltebh3ex2rdfpspdxbcyrgp6kqczjtg4xd7ay7dfmbf7id.onion
⬇️
Never
http://iromfhuademn34fsfdvdrobxdj3tz7mfp2rdj4o2nmfp55fr6xgm3hyd.onion
⬇️
Never
http://j7gpjp46swlikocg3v7tlxc2zdrdlg5gft62bnqiqjgv4lzvaeg6h5id.onion
⬇️
Never
http://jrq44df5h2xysjsajuidspv7zxl7g7v7viujicudptufaozi2i65cnad.onion
⬇️
Never
http://khmpzqnzpya5o27lyp2vt2vw5cy7rb2mfflrhmikubhetncf2nh7ahad.onion
⬇️
Never
http://knt3cs4tkxqdnrjrzk3n7txyhb6c5szkgjwy74jomyvy5xuli5qcdsid.onion
⬇️
Never
http://kv7nxc6sg625vl4rd4fsy4asero3jqivp7zyhaohsyww2xnk7r7yenyd.onion
⬇️
Never
http://kx77iuzg25qlesz3zm7nvy4i6vxecc5jtksf5gllknescfktvzhyo2yd.onion
⬇️
Never
http://kxmbveamxzfrnxacprpbldcy3p263kvrjiblaw4p55mzrkaf3si6w4id.onion
⬇️
Never
http://l2gsnjel3ongbhzvuftuhkbkx5uoso7fvsfqq6oxt25ph4anxxwnl2qd.onion
⬇️
Never
http://ldl45mghc3vscfucdntjc2cax7z3k5fxxxfthvrxhilr4sk2a2dveqid.onion
⬇️
Never
http://lkwkv2pzl3rpo63pqagijqsdo5t52lqwvuu5n34ito4jjnkyfc66smyd.onion
⬇️
Never
http://m6hx7svbvoxhkylaey2jfqxxcychksmx7n455aavt4nan6cuztzkiiyd.onion
⬇️
Never
http://m75bpllrckr7gus26rd6clvvcq6my6tb2bmw6crsevft4t4sv4fsbeyd.onion
⬇️
Never
http://mdixxkgamwij6sy7stxy4fiqwbmfmci2fbjbbndaq2txgaz25zz23xqd.onion
⬇️
Never
http://o522tg3wwqzypsc5yosrhr7mji5as45p2srrzvwd762h5sparfw3j2id.onion
⬇️
Never
http://oylk6phjrgcjvhv5rjijwrpcqj4ig3f2evbxb6lzofw7cbgxlpetq7ad.onion
⬇️
Never
http://p4tn5c42tfkr257a5djzs7iadvuunb7ydowuc6s2ghifbv5buc5pvsad.onion
⬇️
Never
http://p5f7j74vjhcifcxjmg7dswszfsk5z73ftohjj4nlnq7k3qcy4vtxraid.onion
⬇️
Never
http://pmpkjv36ca5ykwmjnfnr5cadctt4ldcekaxocbwa57btujhi7mly6kid.onion
⬇️
Never
http://puqwe2eijzpw33p65qq4ql37dtza64ug3hpsflgxvok7kipzinzry2qd.onion
⬇️
Never
http://q72tfgqh6wi237u2nqxuyuiawkyac5p6qav7mo2r67mu3ufl5gbou2ad.onion
⬇️
Never
http://qfhgvlly3qmrp4sbpr54bc6ci2riwuac6aw72enw2xmcb5yo57jzmkad.onion
⬇️
Never
http://qpcdrem3wd7ihi3x2tfgy7tvh2ldck4nezaxotxqc4vrc2ek3hkmejid.onion
⬇️
Never
http://qrrfiv7l5gsrc7q2n6mfxrbaq33vsvum7d6plx4maslkfxk5pmxt6ayd.onion
⬇️
Never
http://r4aub3bfqf4jh2e6whomjt6bs6abzvtlhwuu2us4fhglnhic3rjegoyd.onion
⬇️
Never
http://rq4ahdxs5yjm5s66d7dkgwpwduzj6e5yckhdt2mqmc3utp47ap3fjcyd.onion
⬇️
Never
http://rwkwobi6dz6dxzhnjpnau77ejcq3ar4ajjal42pj7usotilyj3bbfpyd.onion
⬇️
Never
http://rzs7rnmp37k6g3wbmym7oi23h2cc6wcf65oxsetun6cp25sna6256xad.onion
⬇️
Never
http://s5hcgpxzeehnkwlpb3xkelvkv6rpi5rszmhfeywncja26bxdzexp6zqd.onion
⬇️
Never
http://s7isfnfsrrnogkkvzzmqpqlcehajalaht5nmel7nbxwhvqc52jj2ejid.onion
⬇️
Never
http://sktwn6mi53hbyylkzswtquemuuirsn5qivdz4evhgbobqqzcfbw6pyid.onion
⬇️
Never
http://smo3gebcr5mkff7ja5ayi2xdz2xsapdixak4eosj5ah6fgrbluoxrkqd.onion
⬇️
Never
http://t3zm26nipjrttk5bzbr37crc32kufsixoonf7tmyqviduogoul54vbad.onion
⬇️
Never
http://td4ngpvlle7udkh5svgilgph5v3f63uo3hv3coh7gpdsqozo6it46sad.onion
⬇️
Never
http://tfeo2er3vmcal5tltu7vpnegh2cmmjsdyldfhisdco75mysi4ta6dsqd.onion
⬇️
Never
http://toeaxffzwscqgb7ftetfvldqf2xkqfx4g5kpqejney2ysyirtqdwcvyd.onion
⬇️
Never
http://tuw6in37vku6kg3mvnwaxsldhruujpihibpxbq5ne42phqgv4ekuirqd.onion
⬇️
Never
http://u27qc3ar5s2pqaod5ugxwyymaay6zii5lqfeo4nrs6ykysgzznk3kmad.onion
⬇️
Never
http://u3cko3mc66cfvnf5luzkw5n36q34eges5raq2i3viuiewfvnkqoxztid.onion
⬇️
Never
http://uab4byztmlcfsqb6v7pjoe3pnrvx2uckcuegvjyqui4wzy77jppzd3id.onion
⬇️
Never
http://ucrh53a22g5l3swwtfvvrjjtawrubpedn4s7lws4krbyy7itpvymybad.onion
⬇️
Never
http://uvovouktcgmq55h5i7axt4qrms6iq6znn5cfcrmg7qjseray4dcjxxqd.onion
⬇️
Never
http://vgkclj5nqv53iy455dlfthg75a5cg6ndkazvizrnxrx7fshdqzw4m2yd.onion
⬇️
Never
http://vldmvht6s253et33ce6gcth2vikuvsi7xgkzim5frqiowq6an6tmlaad.onion
⬇️
Never
http://vzxulehmjar6jmkjiy6qpj5mbgma3nl7o2mncrimjwjl5j3lk5ea35ad.onion
⬇️
Never
http://wiuco7yxvd6ygklc5kngraftysq7sgtkpcqtstpthj3ihxdarjlojcad.onion
⬇️
Never
http://xqclaoqanufx6z77e3ieun4xvmrsenolxjhhvlk56yfncuke66myfsqd.onion
⬇️
Never
http://xvks2js3rexd7kyzitdpnwzzqt3s5xxqj2dkydep6r563u7bgfgbdead.onion
⬇️
Never
http://y7u6xpydaobdwz7puojmze3estmhyx4qpbpihm2qfsfdgoenns6gtcid.onion
⬇️
Never
http://yh4vjsv3u27zlzosrsjc5aveua3iclhifjmwdr5uujsaqz7hfkkljfid.onion
⬇️
Never
http://ymfmzthvho5q7jituowluckkq45dogsf3ru25ev4nlehaq65hy4w6pid.onion
⬇️
Never
http://yo3f4ytjbuf3j4bx3m6s523e5hue7afxaprlikjuxf57ed7pc5dnpaid.onion
⬇️
Never
http://zae5d3try3lmnpb6mcx2mbqgp5xawuixm4ktofscv63btekwvcpg6ryd.onion
⬇️
Never
http://zawzev3zlywn7dy642nokfgmkmupgsrfhhquhhqkgcwml2pk7io6fjyd.onion
⬇️
Never
http://zcll3muuhw3uqtgxzdojqv52fuifg5z2knk5w63mljvujs2g2wywluid.onion
⬇️
Never
http://zf3raijx7m6xm72uenqrql5b2qtkbvnxi7fgzqjxfcizp7lylmvzvdid.onion
⬇️
Never
http://zu4jfbwu4on24mvtxm3gojoaw6ltk4wlebtfvly4haykp4tusdcrv5yd.onion
⬇️
Never
http://nnkx3zqi3whqyxh4edu5gpydeni3rzzyxoicsvevni25a5jdoc5xceqd.onion
⬇️
Never
http://evy3ssetplcrv5rzzzbxia75oroocvrhavc72pfy75e47g4zfz4vfwyd.onion
⬇️
Never
http://dou6ktqds2xidxlvwuqgruos2mjnqcbsdoeensjoolmzz2gby6uqe4id.onion/
⬇️
Never
http://pcpokxdz5zn3tmzfbqyyfuodm6pkgrysiqcckbahzgyzirx2av44w4yd.onion/
⬇️
Never
http://y7d2iez7vkt7yzpk6cmrxmntqxgrrizqmmi4oxpyv6g2rl4bn4xew3ad.onion/
⬇️
Never
http://koh3nn7qf3xty73fewu7kuj7w2trzt5yuoj7babbuhzdknuwhpct2qyd.onion/
⬇️
Never
http://2wwpi2kstrba4t3i5or3soqgvcc7luzpxntqfd2dya6kdmfdqj3sr3qd.onion/
⬇️
Never
http://6rtliyde3asuj5k6jfnjrbogsni3zogbqybs3jpqfc7qc7ukeebzzwyd.onion/
⬇️
Never
http://tqduzttjebt7vz3vla2mwe26bmjty7p7gvs4dhyzc4w6hzrgxfljr3yd.onion/
⬇️
Never
http://qf62tupgogwy34gn5jt2ewpe2bdxpb7idzmrdu4axdznuuezxbtk7aid.onion/
⬇️
Never
http://iromfhuademn34fsfdvdrobxdj3tz7mfp2rdj4o2nmfp55fr6xgm3hyd.onion/
⬇️
Never
http://4qcwvs4nciukxpxls3lpcozkabqa6l3iaulgbm7lxssnlpv7clnz4lad.onion/
⬇️
Never
http://3eu5bvf4d432dprtsdu3evlr6pxbbewxncnzjkib2ffp5osuxwzaa3id.onion/
⬇️
Never
http://fe2pbzsazb4eh76tpn4hqo63erhuusyjlvio5msocqeibz3culyg63ad.onion/
⬇️
Never
http://qosur3hbdiz4jok45wnfwz3gtf7mxbzurpgoqtejlwncoqlhmaousxqd.onion/
⬇️
Never
http://s4xsrikoxn4wo2k4julmxyxryiiv2nrqke4jz7ybpk73m4cpzadjpxqd.onion
⬇️
Never
http://qmbvp3z7x55c2p6deewt4irg2i6xdzswgsg6ihtgwd3mf6w22i36s3yd.onion/
⬇️
Never
http://6vnrkxk3z5sw3l56n3qrl4rwzq5acdxhupjigc34zofgebnzdfjkkbad.onion/
⬇️
Never
http://thv7beevnkocwviamffpzd3tobl67fvcbrd637ok5xzmxlqltmkvtmqd.onion/
⬇️
Never
http://yczpqk7e7plndnhjjza4jcq3yagd6djdfpnal4sgabna2vkccxr56cad.onion/
⬇️
Never
http://cou6hffzhudgz57olebxcn5wr2zn25w3yrk7j4jci3dtkrxxqs7foxid.onion/
⬇️
Never
http://xbrljl5nlnt65x7aqne4lbiy2rwgjpro5ng54dy5hfexsnvtawqi4jqd.onion/
⬇️
Never
http://67ni6yaafbculxsbupuzageg2eselgc7bc6gkvc43tt2zhlh7jgmkoad.onion/
⬇️
Never
http://dx3nurcicb2rzydbkam7eibrlrpxnjnfvkj2557wzgvmz7be2hn6ufid.onion/
⬇️
Never
http://yv7fbzjdvg4e3fdgxnnq4oepu2wk6kuhhfuc36gzr7szxg7crjhorryd.onion/
⬇️
Never
http://bl5h2vwa6jepjog4aviyv5garfvz4bc4t5tk6ioyaae4m7zoflb36jid.onion/
⬇️
Never
http://p3yzpoltrm3e65rlqtmwefnunyz22wdjuaf4bfumqbey4edaeqq44did.onion/
⬇️
Never
http://xoa7whcgymujxkwepyapthy7bhdc2epokgiau3ybuhgamrf3pxi4z4qd.onion/
⬇️
Never
http://ysg5zoxqeabi5xejxbq43lvdrztyu4hnlrakckc72iko4peg4twh6vqd.onion/
⬇️
Never
http://lmkgzahy3yya7bwmkmigx6j32d7u7nqex6hbx5izz7y3n6uwjx3as2qd.onion/
⬇️
Never
http://figqod3no4syanbp2b2eqtao7dmxauj6bb2bnkx3gdmgqjlqhe5beaqd.onion/
⬇️
Never
http://7x2vezv3s2vjh5h36hh2iovz53bi2qtlzcflkojedphny2mms2ok5cad.onion/
⬇️
Never
http://kokaplp6lcwfwjkotajkn2ggf4lid5trsgzhg32cbsjopmyfytyhubyd.onion/
⬇️
Never
http://ayzkcslvoiiahzrhqtc6zhe44mql5oqmbe6tyxljfhph26lbxtdqqlyd.onion/
⬇️
Never
http://wake57gge7jfbrjssm65yac6fewan5nth5hhlcg7lorvmpxsnknf4xqd.onion/
⬇️
Never
http://7nylg5iafpqfbpad6gtfkj22kp74iihr6lxtn3qmpgpasazqeb7cabad.onion/
⬇️
Never
http://7z7aukowd72il3iobtboovofkqdluuva3bz5iwfazf4xwsdqpputukyd.onion/
⬇️
Never
http://wb52j3p5alcgno3oczubcqflq7v6ilta3pcqneu77l5bujpiib6ixdad.onion/
⬇️
Never
http://5xble3ivix7mjdfwd5232g2hegofrcithkwxb3vj7skwstnkose2p2qd.onion/
⬇️
Never
http://qkypx555r7e5ukg4bso3iqqagfxhedq3tqq7f3iipbv6smv7hkp53hid.onion/
⬇️
Never
http://g7p4ildkspr57fflg2f4fvektshe7mmzprkol746vsyqdsshgufwoqyd.onion/
⬇️
Never
http://iln5j3cnabk3ftczrwwh2z7rdilnvkc426po3ogqb3y222xwqxizy2yd.onion/
⬇️
Never
http://i4utqt3qnrm2hxhvitunmj4b7777svzbzrc4ewig6j4g6g5zzqahz2qd.onion/
⬇️
Never
http://nhrlosgix7xlkriwvygx52v5jvxn6cb5cpl5gfmhg2dtyvyb7a467iyd.onion/
⬇️
Never
http://jtred7eoefpgm5ztmh23zclbu5ekzpyjo52iw4d56n6e3bcslcxpjuqd.onion/
⬇️
Never
http://zboneu6najwucvrfjac5gc6psuthqoz27x6fpiiuvttulph5aqz4qwid.onion/
⬇️
Never
http://cgfblcrvlj5w7ebescbqftb3yfmc3qyo3n5p6vuvfouoagglyjlhmbyd.onion/
⬇️
Never
http://dyl5qyy6yb5r74xb433h6ushzg3c2y22ec5h7h66pxarnaoxufjmyxad.onion/
⬇️
Never
http://bvzv2g6falu42anoejm2lqc6l7vh5upojbhwgi6dxvxksjuw27s4vkad.onion/
⬇️
Never
http://youje56g7jlgmqwhxat7ua7ysmmm4vogmrcq7cryod32bmzba37l27yd.onion/
⬇️
Never
http://aayeie6my37ka7eefln7nnzabwidh7jj4bzcjykgblpmjomruk3tvjyd.onion/
⬇️
Never
http://5un4e2c2cf6cfguw7uo2xyo5dnsctnuh3znahrmuibdjbspyu3byhzqd.onion/
⬇️
Never
http://ok3dimj5y3g53dpmhlvhzwujaefzdey5kg6feftvc6coubssglfkilid.onion/
⬇️
Never
http://6it5uyalzfdm37jenradhm55gocsflhhykgu7uts4me4y3xxmqfbnuqd.onion/
⬇️
Never
http://7qkuhmqkltor7szib66etg4qywk7i2hzjgpkktt25ulytf6rlwi43mad.onion/
⬇️
Never
http://bo2s5jld3oihh7hrvx4phucfhxedfjf2szsuvk4nylbexz62bxd3mfyd.onion/
⬇️
Never
http://asvbfh7ahbnxijciovwijfr23yua4pjz3e5ha4y6vzankdqn5b4a2lqd.onion/
⬇️
Never
http://zvi7ejdaod3v2obbacrtkao427p4xuigxfy656plngti6vw27st5tqyd.onion/
⬇️
Never
http://f3oc5fzkfhftqajilnvofdhzy4hhwrzq4sv5pc4gkp5rv4ezvz7vd6yd.onion/
⬇️
Never
http://3nnwjjrje6lpisqybb3n2qvplv3fjokwc3qrx764a4lbvgyjmcbbveid.onion/
⬇️
Never
http://xvxa63spw6llq27eag3oesph4dfcyf3e4i3du5s3dbvrsikp4dg7jyid.onion/
⬇️
Never
http://c2jylvw3ngkppt3ypvjtk7sx6fyli6mddvcrjihn3lyfeqkgbhxdvaid.onion/
⬇️
Never
http://2zxwt43zxq2d4wrgbxtxstcvv3sl2bq7t2udd6iifkmea2a3d7js3aqd.onion
⬇️
Never
http://7ctoklhp3yp5gxile3s57dusuvwozfav4r4hhhszbr5zg43rv4rgmbyd.onion/
⬇️
Never
http://pedsqcmmkfi7p2kdrg5f2uz2ko45oeby3zmyccm37pw3xoflngfdedqd.onion/
⬇️
Never
http://olmvtwarcgoqreayhpjhxtl7tozj5fnmyavzj5jphyy4d2qccio4klyd.onion/
⬇️
Never
http://qsmu6ufeelmqfzk5odx2rlg23ic46q7eamemi3ho23qads3wkqo6pmid.onion/
⬇️
Never
http://7fncnamu5ghwrj43qifs3nf7xeif4kgd2olcpt636yz4n5cm5nd7gvyd.onion/
⬇️
Never
http://med6cjvoucuksae7f7bdbyql26peuqe2pyurw6zshepumnhl3qyntsyd.onion/
⬇️
Never
http://3tdyvf3u4xko2xbra3bi4qsj2pedqdkglxkgfofyqip2sljxdbwyymyd.onion/
⬇️
Never
http://zyb7j23sfsert574hii342lwnz7qeyw2kb7zom74wjabwhifhpoknaqd.onion/
⬇️
Never
http://glt2d33vz3snwvqlje6qrw5khsej7auow4nxnvelwh7udq7df6vnblid.onion/
⬇️
Never
http://pl6muez3z2vulhixcyipmi6n5xaynkew6umjhhv64xg2baomk6pzzayd.onion/
⬇️
Never
http://rjwjksouddfq3x2jzieb6k7gpkjv7ukyfwqinterxtbtrsoipk6qedad.onion/
⬇️
Never
http://wpsi2cbbm3ckhgizllilxohq3ejpvj2m34grvcmx76eqwtrhzjeo7ead.onion/
⬇️
Never
http://zkvwuf2mzqs33vuvhk3pxk3jphvps3ldivwa5qljyryj673mbszjrnqd.onion/
⬇️
Never
http://onnaqkbezn3c2c667lp2bj6ycmns557i7lqr2ms7w25ed63745rbreyd.onion/
⬇️
Never
http://oaiogo6dhwk7buevuib5awotcu2gotscqq2twthygxsagtnmp2zcbcid.onion/
⬇️
Never
http://rjztxzrwzbdgas53v23g5sgmtl7nb7qplrzu3x7b4n2dsy5uq54vgyyd.onion/
⬇️
Never
http://7q4ha572hakhru54jxonbpnhch3nlhwdw7ughj5j3jhiyyr2lflxojqd.onion/
⬇️
Never
http://q4pno5sryymcs27txqv7ypmp4lb3z7fyh3mpvk7asqun45wvrq3mprad.onion/
⬇️
Never
http://esb67w4m3uhizvoyt7dhcnxj22iv4eq5uiuyysrljn36jf376y4dcyid.onion/
⬇️
Never
http://xsny4ojubybbn6pe6zhrrflggu6lbq3ir3ixcpbtxzplwwjqi4dqidqd.onion/
⬇️
Never
http://3b4bsnquxnxqh64xd56ouav2epxqzrbkbm7j767nwq2lnmtpo7atqmqd.onion/
⬇️
Never
http://4cc2rnrc4jycvf5kagldnusszmrjdpytm4smhs6gmwvci2l7wlqytlad.onion/
⬇️
Never
http://sbpfz6p7uryiuv75rnhl324nazcwsjmaaf6z4o2kiic2tbiguts6hbad.onion/
⬇️
Never
http://epjpr6zxovifiwo2hwcc2ybrqbud4qbk3sc2swqsz3zduoluw5dvnvyd.onion/
⬇️
Never
http://7evca3nibwfav5knc2ksid4khqd7ycgdn6u75r6zjuyytb4vmawxdmad.onion/
⬇️
Never
http://has6dlzs5mbxl2xkh4exhvg2k4hx4ijpntkpnbhdi37ecqv7ekxu5vid.onion/
⬇️
Never
http://utuc2ul4pdmomok4uozskzumjdh7jk2pjab5suquszybcfkvmfd2lrid.onion/
⬇️
Never
http://eiv53oqiermgz7o5bt3ct4aaedme3qx6l7cmk3sedx2m6njt43bo4vid.onion/
⬇️
Never
http://6rix6baa5hvfukufxynvnisglz6j3xxemu56zpxpyglbvnkl6ekd2uyd.onion/
⬇️
Never
http://gtjoeyd6kus67etnla2dzmxpfd43lozfrwwyozc4pr3jdnu3bericxad.onion/
⬇️
Never
http://6o345jyfcsrep5dcaqrgd3vv636ctwri44u6fpy4soxg3se7iqhtdgid.onion/
⬇️
Never
http://tjmo27stmgvg45k3jltnk2zi6xglze2ml7tgx5ihkacrewabdgcw4bad.onion/
⬇️
Never
http://prbabjw42fjlzveba3q3wlo47jy2ksa76e2fnkt4tftyvylv32lv7lqd.onion/
⬇️
Never
http://ic6owbrtkkymvcyxlvqzocungo54veltezfbvr7dgss4xioi5kfjb5yd.onion/
⬇️
Never
http://bx6b255itzvrlprn7kzdzjg6bly54irlox5csndcbymtfaqecjyfv3qd.onion/
⬇️
Never
http://f646peycufbfenfevgpgl7kipwd6j4wez6m2phbgtckufnqiq3cedxad.onion/
⬇️
Never
http://ywuqjgj4nnp7sii4ufpqriwinvm5onbxpemr5e6i2bve6nviirqkugqd.onion/
⬇️
Never
http://yqnzk23gtyf7ayrsgvo6xstbc7mi4j2g4ux5trnqygjbccmvl6q6qfqd.onion/
⬇️
Never
http://tquqffwz5qepxnqtcd5ei3bzqjsyds2g2ywbxxr46nb2z4h7g2jlsjyd.onion/
⬇️
Never
http://snmb65b36sfmx7os37mzqrrmu2zdon237qvafg5p5274nint7i655uqd.onion/
⬇️
Never
http://jow26ytlhvkjjc4dluier5y5ma2bbusexyczpgtfzdx4sh4dzmndbpid.onion/
⬇️
Never
http://acbyrlcgiv6qotpdynv7fu3bpyqtcbo3g3xqqhxrixrrlr2iiasbzzqd.onion/
⬇️
Never
http://uduar2yzjwxbrjjnajaoe6y4nlnfx7bighampsukuwc5ibvcpit5okyd.onion/
⬇️
Never
http://xh23q4ps4lgsbkiifbztqt2w7cacjbkv7b3rpl3o6id262lqwmzooyqd.onion/
⬇️
Never
http://y5qmdnyxbvbx7l2uudjgc4nrlwo6zqhvevr3v5ux5ln7dg2yxvnjcvyd.onion/
⬇️
Never
http://kqmsxmbzkw33qgnbanoaaekuqa65qtk6777w4mkqku4r5kmksk2agtid.onion/
⬇️
Never
http://u237r6z6axkagn6t2qiwx2rrvmq7pvz53tph7hl64geg3ee55gw66kad.onion/
⬇️
Never
http://kqpmhriaqt4kujfnm3wv7ujgzx5pujqqd4logzgzzq3w5wctm62c5uid.onion/
⬇️
Never
http://o76kftemw4lz2dmbaqlkvlq263cbb2twdy5q3767xb42zs7ovvu3yiqd.onion/
⬇️
Never
http://qnjf77dap5e34rw56triaklvaepxeebrku5iaqpnzsm6dy2fyob6csid.onion/
⬇️
Never
http://3hqc4b7iimn3rltumz2l7qbzw4bcx6mgkvbm6yzlkzpcauzmlpqucgid.onion/
⬇️
Never
http://ajtwxvgqssarrfbgbctqrmujf75hbj5l3yu75du4jdhgigiu6e5xosad.onion/
⬇️
Never
http://l7fuh4h4wiseaarmysosohdsfjyya3nkqqx7o74k7wa63ajvalb4g5id.onion/
⬇️
Never
http://qojfcbvlumvzmiu4tyixawquk6bjiwv74aeaubxwtq7rmw4qq7sv2jad.onion/
⬇️
Never
http://cs5c7mye7anrko6axmio5ebugh6gnqas4jbznf4po47i6gfuzuk4zeyd.onion/
⬇️
Never
http://4ozcr5lsrsdxbo3kuqbayykrrl23j2yzmkc7ucgvsu7ejhwlzktzxcid.onion/
⬇️
Never
http://dvvn42vb7umu2ldio424mlwhirmi2isxhbmdbhwbcnbhiekovdwe62qd.onion/
⬇️
Never
http://ra4uys2f4pslov55oj23ckudpbmovj7brrqqnzwu25ux5ul62crbkryd.onion/
⬇️
Never
http://ef4rbuuqzczn2jah6tafzehoglye46vngv55pnddilmh7srpwpfa5fad.onion/
⬇️
Never
http://5azi3hg5bhi37z3dwivqrwhooos4wefome5fdbnz3n3kxvzaycqqd2id.onion/
⬇️
Never
http://zcvqzunsmuotuiw7biqbsacf75uam7rvsfa46ppqwncpt2jxp3x5ryad.onion/
⬇️
Never
http://b34sad6mkvajaffq42fahjiharyfvxwg2va5ybwa2zl5srhmhdhwdqyd.onion/
⬇️
Never
http://xxulor6gj34lqgvj25t6h2giqqic7puhd4khctkr4xb7gsnfdxewfvqd.onion/
⬇️
Never
http://6424n6oazcc5r2waycgrnu57lorupzvcjjphqhu75pn4atcd6oedjgad.onion/
⬇️
Never
http://pfdyhkswxf33nkjlbm2h2lluujca7tdcbmpwd74x5muv4aj5qenaj4qd.onion
⬇️
Never
http://u65evpr7ejtac7cfi3getxwehllwgjdjgkxvrvjq2dmetjuj2uuii7qd.onion/
⬇️
Never
http://7u36ktiv5idgyhyyeociikvftwfkaihisndnqick4qoe4wssjphdihqd.onion/
⬇️
Never
http://ezh5qco6s7hju7uutdogqebrrq6qn3gixodtdnks6t6bbumw4n6c4aad.onion/
⬇️
Never
http://kwjsef73vtinlkt7t4hp3qsjga7uue65elq7jgmtovejsemhp56mnyqd.onion/
⬇️
Never
http://fymqpsou7kwvovkh5uxr4ehwd2tibqhmp25p2mzoi2thtrcstwb2ojid.onion/
⬇️
Never
http://tslnzzg2kkczuo44rdoqkskzaopsqnhrm54bq5sfocxc2fvzll5roqyd.onion/
⬇️
Never
http://g5a2thsvpabyjp6prphsque7nyaauul4rryr2nulytakggkecls23bad.onion/
⬇️
Never
http://authil5bvxkjdiwk7qmdxhxlu2mfinm4hhdcnv24chrc5wzvua2kadad.onion/
⬇️
Never
http://ni2bv45lwna3rshqcmr5hegowp764qhzooi42bddf52557uhaafbdvid.onion/
⬇️
Never
http://ajdtbop62plz3s2uw3rjtegilw4lfmixl7h4p6oset5rq5jihwtehtad.onion/
⬇️
Never
http://3xa42kwkeiwzhjybddfeifad7vn2kvsslybquledvib5xsfkylwtwyid.onion/
⬇️
Never
http://4qmsi7vcdrrutxapxbc7eofjjzfsvam3fehgmk6xyivwcroqkqjij5qd.onion/
⬇️
Never
http://3id2g6u3dwvg7nsarfkgsdf3odp5hb7owvnoqbipbisekudptetuxtad.onion/
⬇️
Never
http://g7btluffqpexhytokv5yjvbksuzcp5ngt5jkcsvnuhajsl42q6s7fpyd.onion/
⬇️
Never
http://kgu25rbtoh5v4s65pcsahocn62m6lo3u42odko6dm2oqfg5mzz3zsnid.onion/
⬇️
Never
http://knt3cs4tkxqdnrjrzk3n7txyhb6c5szkgjwy74jomyvy5xuli5qcdsid.onion/
⬇️
Never
http://2ehvy7e4ng3hcqp2e6af4pnnhehn3wi6ts5ulal4qtpc73c6y67x4eyd.onion/
None
⬇️
Never
http://32b2vdt4nrljyqwinwtqxzech5lqxtj7knkhkgk7akv5b4mfb456lhid.onion/
None
⬇️
Never
http://ihoqnxnvdwybrv6kiteiesjc3ic6du6axtv3arouxr6ddswrxa2wrbyd.onion

Amnesia

Description

Amnesia ransomware was first identified in May 2017, particularly affecting enterprise cloud environments. It does not appear to operate as Ransomware-as-a-Service (RaaS), and there is no public indication of a provider-led affiliate structure. The extortion model is single-stage—primarily file encryption without documented data theft or leak threats. It targets specific file types and resets their modified timestamps. Encrypted files may receive suffixes such as .amnesia, .@decrypt2017, .[Help244@Ya.RU].LOCKED, .CTB-Locker, and several others. Common ransom notes include files named HOW TO RECOVER ENCRYPTED FILES.TXT or RECOVER-FILES.HTML, typically placed in every folder. Executable names associated with its delivery include variants like guide.exe, update.exe, Happier.exe, bstarb.exe, among others. The encryption algorithm is AES-256, implemented in Delphi, and victims are instructed to contact the attackers via email addresses (e.g., decrypt@india.com). No high-profile incidents or geographic patterns have been publicly attributed to Amnesia.

Links

Page title Available Last visit URL Screen

Ank

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://ankexpn6vk3qc5ooyyj7ufi6nmyt44vxbjtbxxkq4bxo7xzghai7kiqd.onion/

Antibrok3Rs

Description

Antibrok3rs emerged as an access broker (not a ransomware operator itself) linked to the aftermath of the 2023 MOVEit supply-chain exploitation. From November 2024 through early 2025, this actor has posted stolen data from at least 15 energy-sector victims, including U.S. utilities such as CenterPoint Energy, Entergy, Nevada Energy, and Appalachian Power—data likely obtained via the MOVEit breach. While some analysts suspected ties to the Cl0P ransomware collective, Antibrok3rs publicly denied any such affiliation. The extortion model centers on data leakage without accompanying file encryption—a purely leak-based threat. No delivery, encryption, or ransom note behaviors have been observed, nor is there evidence of RaaS activity.

Links

Page title Available Last visit URL Screen
One moment, please...
⬆️
2025-08-20
http://antibrok3rs.ir/ Screen

Anubis

Description

Anubis is a financially motivated cybercrime group primarily known for its banking trojan operations but also linked to ransomware activity targeting corporate networks. First identified in 2016 and evolving over time, Anubis ransomware attacks have targeted Windows systems, often deployed after initial compromises by the Anubis banking malware or other access vectors such as phishing, malicious email attachments, or exploitation of unpatched vulnerabilities. The group’s ransomware encrypts files using strong symmetric encryption algorithms, appending distinctive extensions and delivering ransom notes with payment instructions via Tor. Anubis has targeted multiple sectors worldwide, including finance, retail, and government, often combining ransomware with credential theft and data exfiltration to maximize pressure on victims. Its infrastructure and tactics overlap with other financially motivated actors, suggesting possible affiliate or shared tool usage within broader cybercriminal ecosystems.

parsing : enabled

Links

Page title Available Last visit URL Screen
Anubis blog
⬆️
2025-08-20
http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/ Screen

Apos

Description

Apos ransomware surfaced in April 2024 and is best characterized as a data‑broker or leak‑only operation, rather than a traditional file‑encryption ransomware. It has not been observed to conduct encryption, but instead focuses on data exfiltration with threats to leak or sell the stolen information. Targets span sectors such as technology, healthcare, manufacturing, business services, telecommunications, and government—with significant victimology in Brazil, the United States, India, France, Paraguay, and Spain. Reporting suggests its activity tapered off after a few incidents, possibly indicating a one-time campaign or short-lived operation. Though some sources list multiple victims, technical details such as encryption algorithms, ransom notes, or extortion pricing are not publicly documented. Apos is sometimes listed among new or industrial-focused threats observed in Q1 2025, but remains poorly defined in public technical intel.

parsing : enabled

Links

Page title Available Last visit URL Screen
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
⬇️
2024-05-25
https://apos.blog Screen
Rules
⬇️
2025-04-06
http://yrz6bayqwhleymbeviter7ejccxm64sv2ppgqgderzgdhutozcbbhpqd.onion/rules Screen
Apos Blog
⬆️
2025-08-20
http://yrz6bayqwhleymbeviter7ejccxm64sv2ppgqgderzgdhutozcbbhpqd.onion/ Screen

Aptlock

Description

Aptlock surfaced in early 2025 and is characterized by a single-extortion model combined with threats of data leakage. The ransomware encrypts files on Windows systems, appending the extension .aptlock, and then changes the victim’s desktop wallpaper. Victims receive a ransom note named read_me_to_access.txt informing them that their critical company data has been exfiltrated and will be deleted or leaked if they don’t act. They are given 72 hours to initiate contact via Tor-based chat access (using credentials provided in the note), with further warnings issued if no engagement occurs within 5 days. Specific details about intrusion vectors, encryption algorithms used, or known affiliate operators remain undisclosed in public threat intelligence. No reliable evidence links Aptlock to Ransomware-as-a-Service operations or lists any known affiliates.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://sr3b2uzrzzubagq64savzjjarul6bacpk6onddobj72gqkdjgm5z4qyd.onion/

Arcane

Description

Arcane first emerged in mid-2021 under the UNC2190 cluster and later rebranded as Sabbath, continuing its operations against critical infrastructure like hospitals, schools, and educational entities. It follows a double-extortion model—encrypting data (using ROLLCOAST/Eruption malware) while also exfiltrating sensitive information and threatening to leak it. Victims have included institutions in the U.S. and Canada across sectors such as healthcare, education, and natural resources. Initial intrusion tactics involved deployment of Cobalt Strike with custom profiles, DLL-based in-memory execution, and signed TLS certificates, plus use of stealthy GET requests ending with “kitten.gif.” Specific encryption algorithms or file extensions have not been publicly confirmed. The group appears to operate in an affiliate-style model but remains under single management rather than a full RaaS platform.

Links

Page title Available Last visit URL Screen

Arcrypter

Description

ArcRypt (also known as ARCrypter or ChileLocker) was first identified in August 2022, originally targeting government entities in Latin America and subsequently expanding globally. The group employs a single-extortion model—there is no evidence of a data-leak threat or RaaS ecosystem. The malware encrypts files using extensions such as .crypt, .crYpt, and .crYptA3, and uniquely drops the ransom note before commencing encryption. It has variants for both Windows and Linux, including a Go-based Linux version. Communication with victims occurs via Tor-based portals, evolving over time from a single shared site to individualized mirror sites for each victim. In some cases, threat actors have instructed victims to contact them using Tox, creating a Tox profile for communication. Targets have included Chile’s government infrastructure, Colombia’s Invima agency, and organizations in China and Canada.

Links

Page title Available Last visit URL Screen

Arcus Media

Description

Arcus Media first emerged in May 2024 and operates as a Ransomware-as-a-Service (RaaS) with a double-extortion model—encrypting data and threatening to leak it if the ransom isn't paid. The group leverages advanced capabilities including selective encryption (partial encryption of large files with the ChaCha20 cipher and RSA‑2048 key protection), privilege escalation, disabling recovery mechanisms, and terminating critical services like SQL servers and email clients to maximize disruption and thwart defense. Initial access comes through phishing, credential theft, or exploitation of vulnerabilities, with lateral movement facilitated by tools like Mimikatz and Cobalt Strike. Since its debut, Arcus Media has — by mid‑2025 — been linked to 50+ confirmed attacks, spanning industries such as business services, retail, media, healthcare, and manufacturing across the Americas, Europe, and Asia. Victims include high-profile targets like Braz Assessoria Contábil and FILSCAP.

parsing : enabled

Links

Page title Available Last visit URL Screen
A r c u s
⬇️
2025-08-16
http://arcuufpr5xxbbkin4mlidt7itmr6znlppk63jbtkeguuhszmc5g7qdyd.onion Screen

Argonauts Group

Description

Argonauts Group is a data extortion operation that surfaced around September–October 2024, primarily targeting organizations in Italy, as well as entities in Taiwan, Japan, Canada, and the U.S. It does not appear to use conventional file-encryption ransomware methods—instead, it steals data and operates a dedicated data leak site (DLS) to pressure victims into paying. Victims span sectors like technology, manufacturing, transportation/logistics, and healthcare. The group has claimed to steal substantial volumes of sensitive information—e.g., 200 GB from Ivy Life Sciences (Taiwan) and 140 GB from Japan’s Zacros—and publicly disclosed some samples on its leak site. Although some references imply prior activity back to October 2021, these appear to be less reliable and not substantiated by authoritative intel. As of now, there is no clear evidence of traditional ransomware encryption, ransom notes, or RaaS infrastructure.

parsing : enabled

Links

Page title Available Last visit URL Screen
Argonauts
⬇️
2025-03-27
http://jbmk7h6xlkedn2gg5yi76zca6y3jgdlp5wchlsrd7735tlnrmmvqe5ad.onion/ Screen
Fill in the form to start a chat « Decoder
⬇️
2025-03-27
http://4xi5jklauqmjfkwxhs2a6q2d26v2465zfnccacqpz75exv2kzu5aeiad.onion:18080/chat/startchat Screen

Arkana Security

Description

Arkana Security emerged in early 2025, debuting with a high-profile data-extortion campaign against the U.S. internet provider WideOpenWest (WOW!). The group does not appear to deploy actual ransomware encryption; rather, it operates a data-broker-led, leak-centric extortion model, with a structured "Ransom → Sale → Leak" progression. Victims so far include WOW! and several other organizations across sectors such as telecommunications, mining, finance, electronics, and music/entertainment, spanning the U.S. and UK. Arkana facilitates its threats through doxxing and "Wall of Shame" tactics, leveraging psychological pressure rather than encrypting systems. Its operations are characterized by post-intrusion lateral movement and deep backend access.

parsing : enabled

Links

Page title Available Last visit URL Screen
Arkana Security
⬇️
2025-07-06
http://arkanabb66ee4nsdji6la2bu6bwqe3dbtsyf3rxrv6vhiehod7utagad.onion Screen
Arkana Security
⬇️
2025-07-06
http://ransomwvbabemdnwl7lzgeenyfmmhskaed6jcruwhkvapsia76vttzyd.onion/ Screen

Arvinclub

Description

Arvin Club first appeared around early to mid-2021, debuting on its Tor leak site with posts dating back to May 5, 2021. While frequently characterized as ransomware, there is no verified evidence of file encryption or RaaS operations—its behavior aligns more closely with data-leak and hacktivist activity. The group actively publishes stolen data via its Onion site and maintains a prominent presence on Telegram, operating both official channels and group chats (notably with Persian-language content). A known target includes India's Kendriya Vidyalaya school network among others. Arvin Club has shown ideological leanings (notably support for REvil) and claims to have “hacktivist” motivations, including activities against the Iranian regime. No encryption algorithms, file extensions, or ransom notes have been publicly documented.

parsing : enabled

Links

Page title Available Last visit URL Screen
Arvin Club – آزادی برای اتصال
⬇️
2022-08-01
http://3kp6j22pz3zkv76yutctosa6djpj4yib2icvdqxucdaxxedumhqicpad.onion/
Arvin | Blog
⬇️
2023-11-06
http://arvinc7prj6ln5wpd6yydfqulsyepoc7aowngpznbn3lrap2aib6teid.onion/ Screen

Astralocker

Description

AstraLocker first appeared in 2021, likely as a fork of Babuk ransomware using leaked source code. It follows a single-extortion, smash-and-grab approach: distributed directly via phishing Microsoft Word documents containing embedded OLE objects. Once executed, it kills security and backup processes, deletes shadow copies, and encrypts files using modified HC-128 and Curve25519 algorithms, appending extensions like .Astra or .babyk. A “smash-and-grab” style attack, it’s less methodical than more sophisticated campaigns—deploying ransomware immediately upon user action rather than conducting prolonged network reconnaissance. In mid-2022, the operator ceased ransomware operations, releasing decryptors and announcing a pivot to cryptojacking.

Links

Page title Available Last visit URL Screen

Atomsilo

Description

AtomSilo emerged in September 2021 and ceased operations by year-end 2021. It functioned with a double‑extortion model, combining file encryption with data exfiltration and leak threats. The malware uses a hybrid encryption scheme—AES‑256 for file encryption and RSA‑4096 to secure the AES key—and appends the extension .ATOMSILO to encrypted files. Ransom notes follow formats like README-FILE-{computer name}-{timestamp}.hta or ATOMSILO-README.hta. Structurally and operationally, AtomSilo closely resembles the LockFile ransomware and is attributed to the Chinese state-linked actor BRONZE STARLIGHT (aka Cinnamon Tempest, DEV‑0401, Emperor Dragonfly, SLIME34), likely serving as a smokescreen for espionage-driven data theft. Victims spanned multiple industries and countries, including notable high extortion demands up to $1 million USD. The group also exploited the Atlassian Confluence vulnerability (CVE‑2021‑26084) for initial access and used DLL side‑loading for stealthy deployment.

parsing : enabled

Links

Page title Available Last visit URL Screen
AtomSilo
⬇️
2021-12-17
http://mhdehvkomeabau7gsetnsrhkfign4jgnx3wajth5yb5h6kvzbd72wlqd.onion
AtomSilo
⬇️
2022-01-25
http://l5cjga2ksw6rxumu5l4xxn3cmahhi2irkbwg3amx6ajroyfmfgpfllid.onion/list.html

Avaddon

Description

Avaddon is a ransomware malware targeting Windows systems often spread via malicious spam. The first known attack where Avaddon ransomware was distributed was in February 2020. Avaddon encrypts files using the extension .avdn and uses a TOR payment site for the ransom payment.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://avaddongun7rngel.onion
None
⬇️
Never
http://avaddonbotrxmuyl.onion/

Avos

Description

First observed in July 2021, AvosLocker operates as a Ransomware-as-a-Service (RaaS) platform employing a double-extortion model—encrypting files and exfiltrating data with threats to leak it publicly. Its affiliates have targeted diverse environments including Windows, Linux, and VMware ESXi, particularly impacting sectors such as education, government, manufacturing, and healthcare across the U.S., Canada, and numerous other countries. Affiliates gain access through phishing emails, exploitation of vulnerabilities (notably Microsoft Exchange ProxyShell/log4j, Zoho ManageEngine), and compromised remote services. Technically, AvosLocker uses AES (with RSA-wrapped keys) for file encryption, often executing in safe mode to bypass security defenses, and directs victims to ransom notes like GET_YOUR_FILES_BACK.txt while changing the desktop wallpaper. Its data leak site operated from mid-2021 until about July–August 2023. No activity has been observed since May 2023.

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://avos2fuj6olp6x36.onion

Avoslocker

Description

AvosLocker is a ransomware-as-a-service (RaaS) gang that first appeared in mid-2021. It has since become notorious for its attacks targeting critical infrastructure in the United States, including the sectors of financial services, critical manufacturing, and government facilities. In March 2022, the FBI and US Treasury Department issued a warning about the attacks.

parsing : enabled

Links

Page title Available Last visit URL Screen
DDOS Protection
⬇️
2023-07-08
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion/ Screen
None
⬇️
Never
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion

Axxes

Description

Axxes ransomware emerged as a rebranded version of the previously known Midas ransomware group, with roots also tracing back through Haron and Avaddon lineage. It operates via a single-extortion model, encrypting files and appending the .axxes extension. Victims receive both an “RESTORE_FILES_INFO.hta” and a “.txt” ransom note. The ransomware performs extra actions like determining the device’s geolocation, modifying the Windows Firewall, changing file extensions, and terminating processes using taskkill.exe. Its known targets span the U.S., UAE, France, and China, including at least one high-profile victim—The H Dubai hotel. This group appears financially motivated, leveraging historical branding and code of earlier groups for its operations.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://ymnbqd5gmtxc2wepkesq2ktr5qf4uga6wwrsbtktq7n5uvhqmbyaq4qd.onion/

Aztroteam

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://anewset3pcya3xvk73hj7yunuamutxxsm5sohkdi32blhmql55tvgqad.onion

Azzasec

Description

We are AzzaSec — a decentralized PMC (Private Military Contractor), RaaS (Ransomware-as-a-Service) syndicate, and botnet operator at the intersection of cyberwarfare, asymmetric operations, and underground economics. Emerging from the collapse of traditional hacktivism, we evolved into a sovereign digital force. We offer custom offensive solutions to clients with political, financial, or strategic objectives. We are stateless, leaderless, and loyal only to code.

parsing : enabled

Links

Page title Available Last visit URL Screen
AzzaSec Reborn - Hacker Community Hub
⬇️
2025-04-28
http://sebzpewd2zz7jap56r37icjee4pn5scss3mjxz74uq32ua2aa3n5vqad.onion Screen

B0 Group

Description

B0 is a relatively obscure ransomware operation with very limited public reporting outside of leak site monitoring. It appears to operate a data-extortion model, with a dedicated leak site on the Tor network, and no confirmed use of encryption-based ransomware in documented incidents. The group is listed in ransomware tracking services from at least mid-2024, but there are no major vendor reports describing their victimology, intrusion methods, encryption schemes, or specific targeting patterns. Its branding and operational style suggest a small, self-contained group rather than a large RaaS platform.

Links

Page title Available Last visit URL Screen
B0-Home
⬇️
2025-05-08
http://bzsn5crutf7eiq5mlohn2n2lkaqcafp6tsr6g5b3y4rxbq4g32bg3uid.onion/ Screen

Babuk-Bjorka

Description

On January 26th, Babuk's dedicated leak site (DLS) was "relaunched". Bjorka (Telegram: @bjorkanesiaaaa) is the current administrator. Upon launch, the DLS was populated mainly by victims previously claimed by other groups such as RansomHub, Lockbit3, and Funksec. At this current time there is no apparent connection to the original Babuk operation besides reusing the Babuk site template and logos. The groups is also known as Babuk2 by other trackers. It is important to note that the original Babuk DLS was hosted and available up until February 26th, 2024.

parsing : enabled

Links

Page title Available Last visit URL Screen
Babuk - Leaks site
⬇️
2025-01-29
http://7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion Screen
⬇️
Never
http://gtmx56k4hutn3ikv.onion/
⬇️
2025-04-02
http://xeuvs5poflczn5i5kbynb5rupmidb5zjuza6gaq22uqsdp3jvkjkciqd.onion/ Screen
⬇️
Never
http://fpwwt67hm3mkt6hdavkfyqi42oo3vkaggvjj4kxdr2ivsbzyka5yr2qd.onion/
OnionShare
⬇️
2025-01-28
http://57mphyfkxoj5lph2unswd23akewz3jtj7mb6wignwmyto32ghp2visid.onion/ Screen
Babuk - Leaks site
⬇️
2025-04-04
http://bxwu33iefqfc3rxigynn3ghvq4gdw3gxgxna5m4aa3o4vscdeeqhiqad.onion Screen

Babuk-Locker

Description

Babuk‑Locker emerged in early 2021 as a Ransomware‑as‑a‑Service (RaaS) gang targeting high‑value “big game” enterprises across sectors like healthcare, telecommunications, finance, education, and government. It initially deployed crypto-ransomware—encrypting files using ChaCha8 encryption with keys secured via elliptic‑curve Diffie‑Hellman—and later added a double‑extortion model involving data theft and leak site threats. Notable incidents include attacks on the Washington, D.C. Metropolitan Police Department and other organizations. In mid‑2021, Babuk’s source code was leaked, prompting both a fragmentation of its core operations and emergence of variants like Babuk Tortilla and Babuk V2. Affiliates exploited vulnerabilities in ESXi hypervisors to deliver destructive variants, and law enforcement actions eventually disrupted key operators.

parsing : enabled

Links

Page title Available Last visit URL Screen
Babuk - Leaks site
⬇️
2024-02-26
http://nq4zyac4ukl4tykmidbzgdlvaboqeqsemkp4t35bzvjeve6zm2lqcjid.onion/#section-3 Screen

Babyduck

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://babydovegkmhbontykziyq7qivwzy33mu4ukqefe4mqpiiwd3wibnjqd.onion

Babylockerkz

Description

BabyLockerKZ is a variant of MedusaLocker ransomware, first observed in late 2023. It operates under a double‑extortion model, combining file encryption with data exfiltration and extortion. Technically, it reuses MedusaLocker’s AES + RSA‑2048 hybrid encryption, appends the .hazard file extension to encrypted files, and includes a unique autorun registry key (“BabyLockerKZ”) alongside dedicated public/private key data inserted into registry values. Initial access is achieved through opportunistic methods like RDP compromises, with lateral movement facilitated by compromised credentials and tools such as Mimikatz. The variant employs a custom toolkit codenamed paid_memes, which includes tools like "Checker" for scanning credentials, facilitating automation, and bridging toolsets for further exploitation. Starting late 2022, its operators have compromised over 100 organizations per month, initially targeting European victims before shifting toward Latin America in 2023.

Links

Page title Available Last visit URL Screen

Backmydata

Description

BackMyData is a variant of the Phobos ransomware family, first observed in early 2024. It follows a double‑extortion model: encrypting files and threatening data exposure. The ransomware primarily targets organizations via weak or misconfigured RDP access (e.g., remote desktop services), though phishing and initial-stage payloads like SmokeLoader have also been noted. Technical behavior includes AES‑256 file encryption, with keys secured via a public RSA‑2048 key embedded in the binary. Post-infection actions involve disabling firewalls, deleting volume shadow copies, inhibiting recovery functionality, and establishing persistence through registry Run keys and startup folder entries. Encrypted files receive the extension .BACKMYDATA, and victims are left with ransom notes (info.txt, info.hta, or .backmydata) that instruct them to contact attackers via email or Session Messenger. A significant incident involved a coordinated attack on Romania’s Hipocrate Information System (HIS), impacting 26 hospitals and causing widespread system outages across nearly 100 facilities, with ransom demands of approximately 3.5 BTC (~$175,000).

Links

Page title Available Last visit URL Screen

Balletspistol

Description

BalletsPistol is a Python-based ransomware strain distributed via GitHub. An investigative report from June 2025 reveals its delivery through a malicious ISO file hosted on a now‑removed public GitHub repository tinextacyber.com+1 . The infection chain begins when the ISO (named Invoice.iso) is downloaded and mounted, revealing a batch script (MAIN.BAT) and supporting components—including a password-protected ZIP and shortcut (.lnk) for execution. The malware performs privilege escalation (via UAC bypass using fodhelper.exe), persistence via registry and scheduled tasks, and then extracts an executable from the ZIP to commence the main payload. This binary encrypts user files with a hybrid AES + RSA scheme, adding the .iDCVObno extension to encrypted files; it also drops ransom notes (RESTORE-MY-FILES.TXT or .HTA) and changes the victim’s wallpaper.

Links

Page title Available Last visit URL Screen

Beast

Description

Beast ransomware emerged in 2022 as an enhanced iteration of the earlier “Monster” ransomware. It operates under a Ransomware-as-a-Service (RaaS) model, offering affiliates rich customization options to create tailored binaries targeting Windows, Linux, and VMware ESXi systems. Key technical capabilities include hybrid Elliptic-Curve + ChaCha20 encryption, segmented file encryption, ZIP wrapper mode (encrypting files into zip archives with embedded ransom notes), multithreaded processing, termination of services, shadow copy deletion, hidden partition usage, and subnet scanning. Affiliates are provided configurable offline builders, enabling streamlined deployment across multiple platforms. While Beast's functional power is well-documented, details on its specific victims, sectors targeted, and leak site activity remain limited in public sources.

parsing : enabled

Links

Page title Available Last visit URL Screen
BEAST LEAKS | Index
⬇️
2025-08-20
http://beast6azu4f7fxjakiayhnssybibsgjnmy77a6duufqw5afjzfjhzuqd.onion/ Screen
Index of /
⬇️
2025-08-15
http://ooie6tet7ggcmlgvtmyvok4s6vha6ecwczssbchbyxrg2r6v2m6zkkad.onion/ Screen

Belsen Group

Description

aka Belesn Group. Belsen Group emerged in January 2025 as a data broker and leak-focused threat actor, not engaging in ransomware encryption. Their first major action involved publishing sensitive configuration files, VPN credentials, and IP addresses for over 15,000 Fortinet FortiGate firewalls—data likely stolen through exploitation of CVE‑2022‑40684. The group began by sharing the data freely to establish credibility, before shifting to monetized access and offering sales of network access to high-value targets such as major banks and an East African airline. Their activities place them firmly in initial access brokerage, targeting confidential infrastructure details for sale.

parsing : enabled

Links

Page title Available Last visit URL Screen
Belesn Group
⬇️
2025-03-12
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/ Screen

Bert

Description

BERT ransomware (also tracked as Water Pombero) first emerged in April 2025, rapidly targeting both Windows and Linux systems across Asia, Europe, and the U.S., with confirmed victims in healthcare, technology, electronics, and event services sectors. Its Windows variant employs a PowerShell-based loader that escalates privileges, disables Defender, UAC, and the firewall, then downloads the ransomware payload. The Linux version aggressively encrypts with up to 50 concurrent threads, forcibly shuts down VMware ESXi VMs to prevent recovery, and appends extensions like .encryptedbybert or .encrypted_by_bert. BERT uses AES encryption, and later variants feature optimized multithreading via ConcurrentQueue and DiskWorker threads. Analysts note code similarities with REvil and Babuk ESXi lockers, potentially pointing to shared development lineage or code reuse.

parsing : enabled

Links

Page title Available Last visit URL Screen
BERT
⬇️
2025-08-02
http://bertblogsoqmm4ow7nqyh5ik7etsmefdbf25stauecytvwy7tkgizhad.onion/ Screen
⬇️
2025-07-01
http://wtwdv3ss4d637dka7iafl7737ucykei7pluzc7is3mgo2vl5nmq7eeid.onion/ Screen

Bianlian

Description

BianLian ransomware first appeared in June 2022 as a Go-based crypto-locker but pivoted in January 2023 to a pure data-extortion model after security firms released free decryptors for early versions. In its initial phase, it used AES-256 + RSA-2048 hybrid encryption, appending the .bianlian extension to files and dropping ransom notes with Tor links. The group targets a broad set of industries—healthcare, education, government, critical manufacturing, and professional services—with confirmed victims in the U.S., U.K., Australia, and Canada. Initial access is often obtained via compromised RDP credentials, exploitation of vulnerabilities in internet-facing systems, or use of stolen VPN credentials from infostealers. Post-compromise, BianLian conducts network reconnaissance, credential harvesting, and exfiltration of sensitive files before issuing extortion threats on its leak site. The group has claimed responsibility for dozens of breaches, with ransom demands often in the $100k–$2 million USD range.

parsing : enabled

Links

Page title Available Last visit URL Screen
BianLian | Home
⬇️
2025-04-02
http://bianlianlbc5an4kgnay3opdemgcryg2kpfcbgczopmm3dnbz3uaunad.onion/ Screen
BianLian | Home
⬇️
2025-04-03
http://bianlivemqbawcco4cx4a672k2fip3guyxudzurfqvdszafam3ofqgqd.onion/ Screen
⬇️
2025-02-10
http://bianliaoxoeriowgqohcly4a6sbkpc3se2yvxgidxomxlpuhx5ehrpad.onion Screen
⬇️
Never
http://bianlianvjr9vhy72f782342yvygfciusgfisgiygfs1bredw.i2p/

Bidon

Description

BIDON is a variant of the Monti ransomware family, first observed around mid‑2023. It employs a double‑extortion strategy—encrypting victims’ files and simultaneously threatening to leak stolen data if the ransom isn’t paid. Notably, it appends the .PUUUK extension to encrypted files and drops a readme.txt ransom note outlining the extortion demands. The note offers a free decryption of two files as proof of capability and emphasizes that only authorized company personnel (e.g., top management) should engage. BIDON specifically targets corporate and enterprise organizations, not home users, and warns victims not to involve law enforcement or third-party recovery firms. It represents a shift toward more aggressive extortion tactics within the Monti lineage.

Links

Page title Available Last visit URL Screen

Bitransomware

Description

BitRansomware (also known as DCryptSoft or ReadMe) surfaced in November 2020, primarily as a widespread cryptolocker targeting end users in the APAC region, especially universities in Japan and Hong Kong. The malware was delivered via a malspam campaign powered by the Phorpiex botnet, distributing deceptive ZIP attachments with a screensaver-like .scr payload. Once activated, BitRansomware encrypts files and appends the .ReadMe extension—leaving ransom notes to guide victims toward payment. The campaign peaked sharply around November 4, 2020, with over 28,000 email instances detected in a single day, as seen by VMware NSX telemetry.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://mrv44idagzu47oktcipn6tlll6nzapi6pk3u7ehsucl4hpxon45dl4yd.onion/

Bjorka

Description

Hellcome Bjorkanism Bjorka emerged as a prominent data-extortion actor and hacktivist initially active in 2022, targeting Indonesian institutions with massive data leaks—including voter records, police data, and internal telecom and utility datasets. After going quiet in 2023, the actor resurfaced in early 2025, now positioning under the name Babuk2, leveraging legacy branding from the Babuk ransomware group to amplify perceived credibility and fuel data extortion operations. Notably, Bjorka has not been linked to deploying true ransomware payloads; rather, the strategy revolves around reputational leverage via data leaks and selecting branding for psychological impact.

Links

Page title Available Last visit URL Screen
Databases | Bjorka
⬇️
2025-08-20
https://netleaks.net/databases/ Screen
⬇️
Never
http://wki2kiikvycnowcygyz7p4svefhgwcu57ae7brd5waitbsgoi6yrfvid.onion/
⬇️
Never
http://3lce6cov7sj7vovrr3cbanqoolhgfgqqcvjrtlzlqnex7esdz33mdoqd.onion/
For Sale Page
⬆️
2025-08-20
https://bjork.ai/ Screen
Contact | Bjorka
⬆️
2025-08-20
https://netleaks.net/contact/ Screen
Bjorka
⬆️
2025-08-20
https://netleaks.net/ Screen

Black Nevas

Description

BlackNevas ransomware — also referred to as “Trial Recovery” — was first observed in November 2024. It is a direct derivative of the Trigona ransomware family and continues the lineage's focus on extortion over public shaming. BlackNevas operators support a double-extortion model, encrypting files using AES-256 with RSA-4112-protected keys, and appending the .-encrypted or .ENCRYPTED file extension to affected files. Hybrid payloads are available for Windows, Linux, NAS, and VMware ESXi platforms. While BlackNevas does not host its own data leak site, it reportedly collaborates with other ransomware groups for data publication — known partners include Kill Security, Hunters International, DragonForce, Blackout, Embargo Team, and Mad Liberator. The group has predominantly targeted large enterprises in sectors such as finance, telecommunications, manufacturing, healthcare, and legal. Initial access is commonly achieved via phishing or exploitation of vulnerabilities, with lateral movement facilitated through SMB enumeration and optional LAN-wide propagation.

parsing : enabled

Links

Page title Available Last visit URL Screen
Clist
⬆️
2025-08-20
http://ctyfftrjgtwdjzlgqh4avbd35sqrs6tde4oyam2ufbjch6oqpqtkdtid.onion/ Screen

Black Suit

Description

BlackSuit first appeared in May 2023 and is a confirmed rebrand or direct evolution of Royal Ransomware. It operates as a Ransomware-as-a-Service (RaaS), employing a double-extortion model—encrypting files and stealing sensitive data for leak threats. BlackSuit targets Windows and Linux systems, including VMware ESXi environments, using the .blacksuit extension for encrypted files. Technical analysis shows strong code overlaps (≈98%) with Royal, itself believed to be run by former Conti affiliates. Victims span healthcare, critical manufacturing, education, and government sectors, with notable incidents affecting public health systems in the U.S. Initial access vectors include phishing, exploitation of public-facing applications (e.g., Citrix and Fortinet vulnerabilities), and compromised credentials purchased from initial access brokers. Ransom notes direct victims to Tor-based negotiation portals.

parsing : enabled

Links

Page title Available Last visit URL Screen
This Site Has Been Seized
⬇️
2025-08-20
http://weg7sdx54bevnvulapqu6bpzwztryeflq3s23tegbmnhkbpqz637f2yd.onion Screen
This Site Has Been Seized
⬆️
2025-08-20
http://c7jpc6h2ccrdwmhofuij7kz6sr2fg2ndtbvvqy4fse23cf7m2e5hvqid.onion Screen
403 Forbidden
⬇️
2025-07-24
http://nz2ihtemh2zli2wc3bovzps55clanspsqx5htu2plolby45a7pk4d3qd.onion/ Screen
403 Forbidden
⬇️
2025-07-24
http://qjdremetxo2zpli32exwb5uct6cjljyj7v52d5thn7usmj5mlyxdojqd.onion/ Screen
⬇️
Never
http://yef4xoqj2jq554rqetf2ikmpdtewdlbnx5xrtjtjqaotvfw77ipb6pad.onion/
403 Forbidden
⬇️
2025-07-24
http://ptsfbwx5j7kyk5r6n6uz4faic43jtb55sbls7py5wztwbxkyvsikguid.onion/ Screen
⬇️
2024-10-16
http://ro4h37fieb6oyfrwoi5u5wpvaalnegsxzxnwzwzw43anxqmv6hjcsfyd.onion/ Screen
403 Forbidden
⬇️
2025-07-24
http://cyfafnmijhiqxxfhtofmn5lgk3w5ana6xzpc6gk5uvdfadqflvznpjyd.onion/ Screen
403 Forbidden
⬇️
2025-07-24
http://betrvom4agzebo27bt7o3hk35tvr7ppw3hrx5xx4ecvijwfsb4iufoyd.onion/ Screen
403 Forbidden
⬇️
2025-07-24
http://ybo3xr25btxs47nmwykoudoe23nyv6ftkcpjdo4gilfzww4djpurtgid.onion/ Screen
Index of /
⬇️
2025-07-02
http://k6wtpxwq72gpeil5hqofae7yhbtxphbkyoe2g7rwmpx5sadc4sgsfvid.onion/ Screen
403 Forbidden
⬇️
2025-07-24
http://vm2rbvfkcqsx2xusltbxziwbsrunjegk6qeywf3bxpjlznq622s3iead.onion/ Screen
⬇️
2025-05-09
http://ng2gzceugc2df6hp6s7wtg7hpupw37vqkvamaydhagv2qbrswdqlq6ad.onion/ Screen
Index of /
⬇️
2025-07-02
http://2yxf2ald2c67twt4663piypum2fu6yt4su453naxsdiilpd4m7pgu6qd.onion Screen
Index of /
⬇️
2025-07-02
http://wjdnuogx3mrnnutshrx7nbvjuwqfxnrb32rifaozygwdvs325s75keqd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://wxqhwn52dnzbrtqeywg35jfvzbpwkw7edlxxoil7ag44plraezw5z5id.onion Screen
403 Forbidden
⬆️
2025-08-20
http://5bol522hpd3yknxfct2o35ilimxyo46licxxitjvajtvcedltfrj53qd.onion/ Screen
⬇️
Never
http://weg7sdx54bevnvuLapqu6bpzwztryeflq3s23trgbmnhkbpqz637f2yd.onion

Blackbasta

Description

BlackBasta emerged in April 2022 and is widely assessed to be operated by former Conti group members. It functions as a Ransomware-as-a-Service (RaaS), leveraging a double-extortion model—encrypting data and threatening public leaks on its Tor-based site. The malware supports Windows and Linux/VMware ESXi environments, using ChaCha20 for encryption with RSA-4096 for key protection. Encrypted files are appended with the .basta extension, and a ransom note (readme.txt) provides negotiation instructions. BlackBasta has hit victims across manufacturing, construction, healthcare, government, and critical infrastructure sectors, with confirmed targets in the U.S., Canada, U.K., Australia, and New Zealand. Initial access vectors include exploitation of known vulnerabilities (e.g., QakBot infections, ZeroLogon, PrintNightmare), phishing, and purchasing credentials from Initial Access Brokers. By mid-2024, BlackBasta was among the top five most active ransomware groups worldwide.

parsing : enabled

Links

Page title Available Last visit URL Screen
403 Forbidden
⬇️
2025-01-29
http://stniiomyjliimcgkvdszvgen3eaaoz55hreqqx6o77yvmpwt7gklffqd.onion/ Screen
Chat Black Basta
⬇️
2025-02-20
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion Screen
403 Forbidden
⬇️
2025-01-23
http://6y2qjrzzt4inluxzygdfxccym5qjy2ltyae7vnxtoyeotfg3ljwqtaid.onion/ Screen
403 Forbidden
⬇️
2025-01-29
http://r6qkk55wxvy2ziy47oyhptesucwdqqaip23uxregdgquq5oxxlpeecad.onion/ Screen
403 Forbidden
⬇️
2025-01-23
http://weqv4fxkacebqrjd3lmnss6lrmoxoyihtcc6kdc6mblbv62p5q6skgid.onion/ Screen
thesiliconroad1.top
⬇️
2025-08-13
http://thesiliconroad1.top/ Screen
stuffstevenpeters4.top
⬇️
2025-08-13
http://stuffstevenpeters4.top/ Screen
greenmotors5.top
⬇️
2025-08-13
http://greenmotors5.top/ Screen
megatron3.top
⬇️
2025-03-21
http://megatron3.top/ Screen
403 Forbidden
⬇️
2025-01-23
http://fmzipzpirdpfelbbvnfhoehqxbqg7s7efmgce6hpr5xdcmeazdmic2id.onion/ Screen
403 Forbidden
⬇️
2025-01-29
http://daulpxe3epdysjozaujz4sj7rytanp4suvdnebxkwdfcuzwxlslebvyd.onion/ Screen
databasebb3.top
⬇️
2025-08-13
http://databasebb3.top/ Screen
403 Forbidden
⬇️
2025-01-29
http://l6zxfn3u2s4bl4vt3nvpve6uibqn3he3tgwdpkeeplhwlfwy3ifbt5id.onion/ Screen
⬇️
Never
http://onlylegalstuff6.top/
⬇️
Never
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/
⬇️
Never
http://bpeln2aqs66qqfuex2cvcyjiy5ggcwbyh5nbmxzxt6daamkmpmufv4qd.onion/
⬇️
Never
http://ond5arqab77n6tykvi4aqp7oqegqdfgqfyf7fzyhfyhmbp7iafpzdtad.onion/

Blackberserk

Description

Black Berserk is a relatively unsophisticated ransomware strain analyzed in late 2023. It operates under a single‑extortion model—encrypting files and demanding payment, with no documented abilities or threats for data exfiltration or public leaks. In observed cases, the malware appends the .Black extension to encrypted files (e.g., 1.jpg.Black) and leaves a ransom note titled Black_Recover.txt, which urges victims to make contact to negotiate payment or test decryption with benign files. The infection method appears opportunistic, delivered via isolated incidents or broad malware distribution—not linked to targeted campaigns or infrastructure. There is no evidence of it functioning as a RaaS operation or targeting any specific victim profiles or sectors.

Links

Page title Available Last visit URL Screen

Blackbit

Description

BlackBit ransomware was first observed in August 2022 and is a .NET-based strain that closely mimics the design and functionality of LockBit 3.0, indicating either a fork of LockBit’s leaked builder or deliberate imitation. It uses a double-extortion model, encrypting victim files and threatening to leak stolen data via a Tor-based site. BlackBit employs AES symmetric encryption for file contents and RSA asymmetric encryption for key protection, appending the .BlackBit extension to affected files. The malware also includes features for terminating processes, deleting volume shadow copies, and disabling recovery mechanisms. Initial access vectors are not comprehensively documented but are consistent with phishing, exploitation of vulnerable public-facing services, and the use of compromised credentials. Victims have been identified across various sectors, including technology, manufacturing, and professional services, though its activity level has been far lower than LockBit’s.

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://blackbittk6ux3mtrbh2qjpmrkygdmh3uqafj5h2dg2bt63jzh5xf3iad.onion

Blackbyte

Description

BlackByte ransomware was first observed in July 2021 and operates as a Ransomware-as-a-Service (RaaS). It uses a double-extortion model—encrypting victim files while exfiltrating sensitive data for publication on its Tor-based leak site. The ransomware is written in C# and uses AES-256 for file encryption, with keys protected by RSA public-key encryption. Early variants exploited the ProxyShell vulnerability in Microsoft Exchange servers for initial access, but later campaigns have leveraged phishing, malicious attachments, and vulnerable internet-facing systems. BlackByte appends extensions such as .blackbyte or .blackbyte2.0 to encrypted files and leaves ransom notes (BlackByte_restoremyfiles.txt) instructing victims to contact them via Tor. The group has targeted organizations worldwide, including critical infrastructure, manufacturing, and government sectors. In February 2022, the FBI and USSS released a joint advisory warning about BlackByte’s impact and offering detection signatures.

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://6iaj3efye3q62xjgfxyegrufhewxew7yt4scxjd45tlfafyja6q4ctqd.onion
BlackByte BLOG
⬇️
2021-12-30
http://f5uzduboq4fa2xkjloprmctk7ve3dm46ff7aniis66cbekakvksxgeqd.onion
⬇️
2021-05-01
http://dlyo7r3n4qy5fzv4645nddjwarj7wjdd6wzckomcyc7akskkxp4glcad.onion
BlackByte BLOG
⬇️
2022-04-24
http://fl3xpz5bmgzxy4fmebhgsbycgnz24uosp3u4g33oiln627qq3gyw37ad.onion
BB Auction
⬇️
2023-10-21
http://jbeg2dct2zhku6c2vwnpxtm2psnjo2xnqvvpoiiwr5hxnc6wrp3uhnad.onion/ Screen
BB Auction
⬇️
2025-05-17
http://53d5skw4ypzku4bfq2tk2mr3xh5yqrzss25sooiubmjz67lb3gdivcad.onion/ Screen
⬇️
Never
http://a2dbso6dijaqsmut36r6y4nps4cwivmfog5bpzf6uojovce6f3gl36id.onion:81
⬇️
Never
http://vzzf6yg67cffqndnwg56e4psw45rup45f2mis7bwblg5fs7e5voagsqd.onion:81
⬇️
Never
http://inbukcc4xk67uzbgkzufdqq3q3ikhwtebqxza5zlfbtzwm2g6usxidqd.onion:81
⬇️
Never
http://p5quu5ujzzswxv4nxyuhgg3fjj2vy2a3zmtcowalkip2temdfadanlyd.onion/
File downloader
⬇️
2024-12-13
http://tj3ty2q5jm5au3bmd2embtjscd3qjt7nfio2o7cr6moyy5kgil5pieqd.onion Screen
⬇️
Never
http://kpfj3bmo77bwpy2f5zzwj4knatueuv7t3ldlpp4tlrmv2buiziw2tdyd.onion
⬇️
Never
http://ce6roic2ykdjunyzazsxmjpz5wsar4pflpoqzntyww5c2eskcp7dq4yd.onion/

Blackbyte-Crux

Description

Crux is a newly identified ransomware variant active since July 2025, which claims affiliation with the established BlackByte ransomware group. It implements a double‑extortion model—encrypting files (with the .crux extension) and threatening data leak via a Tor-based portal. A distinctive feature of Crux is its execution flow: it initiates via svchost.exe, cmd.exe, and bcdedit.exe to disable Windows recovery, followed by rapid file encryption. The ransomware has been confirmed in at least three incidents across sectors including agriculture, education, professional services, media, and nonprofits, in both the U.S. and U.K. Ransom notes consistently follow the naming pattern crux_readme_[random].txt.

parsing : enabled

Links

Page title Available Last visit URL Screen
BB Auction
⬆️
2025-08-20
http://dounczge5jhw4iztnnpzp54kd4ot3tikhjsimurtcewqssgye6vvrhqd.onion/ Screen
File downloader
⬆️
2025-08-20
http://faow6n2hkweyyalp67zvonafn2dzphw36cav653wamj724mwsmtfa5yd.onion/ Screen

Blackhunt

Description

Black Hunt ransomware has been active since at least mid-2021 and operates under a double-extortion model, encrypting victim files and threatening public release of stolen data via a Tor-based leak site. It primarily targets organizations rather than individuals, with confirmed attacks in sectors including manufacturing, retail, technology, and local government. Encrypted files are appended with the .BlackHunt extension, and ransom notes (Restore_Data.txt) direct victims to Tor portals for negotiation. The ransomware is capable of terminating processes, deleting shadow copies, and disabling recovery functions to maximize impact. Initial access methods include exploitation of vulnerable RDP services and the use of compromised credentials from initial access brokers. While its activity level is smaller compared to major RaaS families, its leak site has featured victims from multiple countries, suggesting an international reach.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion Screen

Blackmatter

Description

BlackMatter emerged in July 2021 and quickly positioned itself as the successor to DarkSide (responsible for the Colonial Pipeline attack). It operated as a Ransomware-as-a-Service (RaaS), adopting a double-extortion model—encrypting systems while exfiltrating sensitive data for publication on its leak site. BlackMatter targeted Windows and Linux/VMware ESXi systems, using ChaCha20 for file encryption with RSA-1024 public key protection. The malware appended a custom extension per victim and dropped ransom notes (README.txt) with Tor portal links. The group focused on large organizations in industries such as critical infrastructure, agriculture, technology, and manufacturing, but claimed to avoid hospitals, nonprofits, and government entities (though some reports contradict this). Initial access methods included exploitation of known vulnerabilities, stolen credentials from brokers, and phishing campaigns. BlackMatter ceased operations in November 2021 after reported pressure from law enforcement and possible member arrests.

Links

Page title Available Last visit URL Screen
BlackMatter
⬇️
2021-11-04
http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/
⬇️
Never
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/
⬇️
Never
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion

Blackout

Description

Blackout surfaced in February 2024 and operates using a double-extortion model. Targets span sectors like healthcare, mining, telecommunications, and food & beverage—in countries including France, Canada, Mexico, Croatia, and Spain. This ransomware employs conventional cryptographic techniques (details unspecified), appends a custom extension to encrypted files, and presents victims with ransom demands via a Tor-based leak/negotiation site. The operation runs as a crypto-ransomware and data broker, combining extortion with data publication threats.

parsing : enabled

Links

Page title Available Last visit URL Screen
Blackout Blog
⬇️
2025-08-19
http://black3gnkizshuynieigw6ejgpblb53mpasftzd6pydqpmq2vn2xf6yd.onion Screen
Index of /
⬇️
2025-08-20
http://4qyjonpyksc52bc3fsgfgedssqgo4a6vlfsjknqnkncbyl4layqkqjid.onion/ Screen
Index of /
⬆️
2025-08-20
http://ao5oo2luy6avdfomyw7hcegmfl4let2g5bzjqjzch6b5rpdshmuvccad.onion Screen
Index of /
⬆️
2025-08-20
http://urey23jtg6z7xx3tiybmc4sgcim7dawiz2abl6crpup2lfobf7yb5wyd.onion Screen
Index of /
⬆️
2025-08-20
http://mu6se7h7qfwuqclr4cc6zy7qevod6gyk37aq5vwnayrtbx3qqycx2fyd.onion Screen
Index of /
⬇️
2025-08-20
http://eleav2eq3ioyiuevbyvqaz3vruwvpislphszo4cm7n56itbpnupxngyd.onion Screen
Index of /
⬆️
2025-08-20
http://2cyxmof76rxeqze5snxxooqmhzjtcploqswxoxmenfayphumdhrtrzqd.onion Screen
Index of /
⬆️
2025-08-20
http://rqqn25k3hgmfkh7ykjbmakjgidwweomr7cbpy6pfecpxs57r5iwzwtyd.onion Screen
Index of /
⬆️
2025-08-20
http://idep6vd7ywl7uruhsutqjdnjawe33hct35523rrmf73kb46xrhfb5sid.onion/ Screen

Blackshadow

Description

BlackShadow is a state-aligned cybercrime group reportedly linked to Iran’s cyber operations, first identified in late 2020. Their operations blend data exfiltration with ransom threats, notably targeting Israeli organizations such as Cyberserve—a web hosting provider—and leaking data to inflict reputational damage. Victims included entities like Atraf (an LGBTQ dating app), tour booking services, and museums, reflecting political or ideological motivations over financial gain. Despite carrying out extortion, there is no evidence that BlackShadow employs typical encryption-based ransomware mechanics; instead, they leverage stolen data and the threat of public exposure.

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://544corkfh5hwhtn4.onion
Hentai Heroes
⬇️
2022-08-07
http://blackshadow.cc Screen

Blacksnake

Description

BlackSnake is a Ransomware-as-a-Service (RaaS) operation that first appeared in August 2022, when its operators began recruiting affiliates on underground forums with an unusually low revenue share of 15%. It primarily targets home users rather than large enterprises and does not maintain a public leak site. Built on the Chaos ransomware code base, it features both file encryption and a cryptocurrency clipper module to steal funds from victims. The ransomware is developed in .NET and includes safeguards to avoid execution in Turkish or Azerbaijani environments, suggesting geographic targeting preferences. Infections result in encrypted files and ransom notes instructing victims to make contact via email for payment negotiations. The group’s operational scale and visibility remain limited compared to major RaaS families.

Links

Page title Available Last visit URL Screen

Blacktor

parsing : enabled

Links

Page title Available Last visit URL Screen
Bl@ckt0r | Bug Hunter and Data Breacher Group
⬇️
2023-10-21
http://bl%40ckt0r:bl%40ckt0r@bl4cktorpms2gybrcyt52aakcxt6yn37byb65uama5cimhifcscnqkid.onion/0x00/data-breach.html Screen

Bluebox

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Bluebox
⬇️
2024-12-25
http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/ Screen

Bluesky

Description

BlueSky ransomware first emerged in July 2022 and is characterized by aggressive, high-speed file encryption using a multithreaded architecture. Written with code elements reminiscent of Conti v3, it encrypts files using ChaCha20 secured with RSA‑4096, and further employs Curve25519 for key agreement. Delivery commonly comes through trojanized downloads from risky websites (e.g., “crack” or “keygen” hosts) or phishing emails. The malware also spreads laterally via SMB and evades detection by hiding threads using NtSetInformationThread. Once deployed, it renames encrypted files with the .bluesky extension and drops ransom notes in both HTML and TXT formats. Unlike double-extortion threats, BlueSky does not operate a public leak site and appears focused solely on disrupting file access. Observed activity spans large enterprises to SMBs, but the volume of attacks remained relatively low through early 2023.

Links

Page title Available Last visit URL Screen
BlueSky DECRYPTOR
⬇️
2023-10-17
http://ccpyeuptrlatb2piua4ukhnhi7lrxgerrcrj4p2b5uhbzqm2xgdjaqid.onion Screen

Bober

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://myosbja7hixkkjqihsjh6yvmqplz62gr3r4isctjjtu2vm5jg6hsv2ad.onion

Bonacigroup

Links

Page title Available Last visit URL Screen
502 Bad Gateway
⬇️
2021-12-28
http://bonacifryrxr4siz6ptvokuihdzmjzpveruklxumflz5thmkgauty2qd.onion

Bqtlock

Description

aka BaqiyatLock BQTLock surfaced in July 2025 and operates as a fully-fledged Ransomware-as-a-Service (RaaS) with a double-extortion model. It employs AES-256 for file encryption, with keys secured by RSA-4096, appending the .BQTLOCK extension to encrypted files. Victims receive ransom notes such as READ_ME-NOW_*.txt, warning that failure to make contact within 48 hours doubles the ransom, and that decryption keys will be destroyed after seven days. The group offers tiered pricing "waves" with different XMR (Monero) amounts for quicker decryption—e.g., Wave 1 might cost 13 XMR, while Wave 3 could be 40 XMR. Targets include organizations such as U.S. military alumni networks and educational institutions.

parsing : enabled

Links

Page title Available Last visit URL Screen
BQTlock :: RaaS & Decryption Portal
⬇️
2025-08-13
http://yywhylvqeqynzik6ibocb53o2nat7lmzn5ynjpar3stndzcgmy6dkgid.onion/ Screen

Br0K3R

Description

Br0k3r is not a conventional ransomware gang, but rather an Iran-linked cyber espionage and access brokerage group leveraging its foothold within victim networks to facilitate ransomware operations. Active since around 2017, the group provides privileged domain access—often sold or shared directly—with known ransomware operators such as ALPHV/BlackCat, NoEscape, and RansomHouse, receiving a portion of each successful ransom payout. Victims have included U.S. schools, municipal governments, financial and healthcare organizations, as well as targets in Israel, Azerbaijan, and the UAE. Br0k3r’s strategy merges espionage with criminal collaboration, allowing them to support both state-aligned intelligence objectives and financial incentives.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://brok3r7bhcblynwpoymgarr6zwcy4ttfbhkhcmotz4lw2gcsuojgaeqd.onion/

Brain Cipher

Description

Brain Cipher ransomware surfaced in mid-2024, rapidly gaining notoriety after a high-impact attack on Indonesia’s National Data Center, which disrupted over 160 government services including immigration systems. The group operates with a double-extortion model, encrypting data using a LockBit 3.0-based payload (Salsa20/RSA hybrid) and threatening leaks via a Tor-hosted portal. Distinct behaviors include encrypting both file contents and filenames, and customizing encrypted file names with appended random extensions. Initial access methods include phishing and purchases from initial-access brokers. Ransom demands have ranged from tens of thousands up to $8 million USD, though victims have sometimes been offered decryption keys without payment. Victims span sectors such as government, healthcare, education, media, and manufacturing across Southeast Asia, Europe, and the Americas.

parsing : enabled

Links

Page title Available Last visit URL Screen
Brain Cipher Client Area
⬇️
2024-07-07
http://mybmtbgd7aprdnw2ekxht5qap5daam2wch25coqerrq2zdioanob34ad.onion/ Screen
Brain Cipher Leaks
⬆️
2025-08-20
http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/ Screen
⬇️
Never
http://cuuhrxbg52c5agytmtjpwfu7mrs4xtaitc4mukkiy2kqdxeqbcmuhaid.onion/
BrainCipher Client Area
⬇️
2025-02-25
http://p6wmotxzvg34tdmpwm4beqgrcyp5iys43snkccsahnw74la3k3xx6pad.onion Screen
BrainCipher Client Area
⬆️
2025-08-20
http://brain4zoadgr6clxecixffvxjsw43cflyprnpfeak72nfh664kqqriyd.onion/ Screen
Brain Cipher FileSharing
⬆️
2025-08-20
http://4ldgw2wuidqu5ef3rzx4byonf3y7rdnh43jiw2z4sbtjiwic6gkov7yd.onion/c/lgc2Yxua65agt4XMOMkQKJjsdrV2IzYk Screen
Not Found
⬆️
2025-08-20
http://4ldgw2wuidqu5ef3rzx4byonf3y7rdnh43jiw2z4sbtjiwic6gkov7yd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://zktnif5vckhmz5tyrukp5bamatbfhkxjnb23rspsanyzywcrx3bvtqad.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://yt7beb7fj6xbh4dndrlyvl3gn4ck36qn2oqheiqjs4bp3wspj3wgpcad.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://i6b4r6blgmm3r62zj42qxn6bvcbcrslcg6b6uwqws6xhnxz2howbhkid.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://pzghjpkm2liszmvjsttflp475zqxgrywjhr7xagc4bqfb2a7aw3qysyd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://5v6tgs5xyuvl7kpg5b26e54kddlxdvktep2qmglawrohksv3qjwvw7qd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://lhdv4ydjx5idzvntdrmcbwsh3dhdi3ww5hoz3ws2d5q5jlfewdacx4qd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://oe7kcuvnulmdzir6zkewv5p353kc7qjf5tyqxfxabhzsm26pji44elqd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://zv27q4tjvqxelm2imgztfg7gtl3v56oqabe77hiufqoqilis2dgcdsad.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://ubetdhmgnry4jk7ya7gh7p4hm4c3c57srkw62oc6hjmvvvkrqeybjjid.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://ixvarmokkir6t6fzpn7prussp3ulys66aeivrhcvrmfowqi2gi2fgryd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://tahr6kwobsi7fj5j3hoyzxr34ipyiyuv2svhteht5td4etq23bcx7tyd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://ncyg34lipi3w2u7yvxl3swr6wj6lsoeix3grrdsn6nmcv4r7vntanoid.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://bgpeqy3d5svuikeaueitix6zosg3pzekw77viulnucsiqsn4sjr65iyd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://as7fbsjvifse52ek5qnptfgvkduvvnl56adb3jjgk6k3p7bisipvotyd.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://xangddavm54rgsju7iceahxztbqrcflzunffwbaswwhhftieygc4j3ad.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://q226mkoikzgyu33jin7ox3qo6tea7yhlgz52p5lslpj73edtocsz4wqd.onion/ Screen
BrainCipher Storage
⬇️
2025-08-20
http://hdgfvxxkepllbvqvk7vrudgwq55tg4joo4xpajaa3nv5gzpake66bnid.onion/ Screen
BrainCipher Storage
⬆️
2025-08-20
http://jgkgqztfmwk53wlttsjo6i3nmwtzoch2oi2bocqzb4zmp6kfspuiaead.onion/ Screen
BrainCipher Client Area
⬆️
2025-08-20
http://braincgksuixxkpkme7zlpkh7u47oryxx574d74ws4eal4t2mxyahbqd.onion Screen

Buddyransome

Links

Page title Available Last visit URL Screen

Bytesfromheaven

Links

Page title Available Last visit URL Screen
Home | BytesFromHeaven
⬇️
2025-08-12
http://jhjqe4vmwfpmjgrminvt7hx7jmcmw2lw45emqmdqyjkvux2eh5lujnyd.onion Screen

C3Rb3R

Description

Cerber ransomware, active since 2016, has resurfaced occasionally using the name C3RB3R. It operates as a semi-private Ransomware-as-a-Service (RaaS) and targets both Windows and Linux environments. Cerber typically uses AES + RSA cryptographic methods and appends the .L0CK3D extension to encrypted files. It executes operations via phishing, malicious macros, and has even leveraged vulnerabilities such as Atlassian Confluence’s CVE-2023-22518 for deployment. Victims are directed to Tor-hosted payment portals for decryption instructions.

Links

Page title Available Last visit URL Screen
⬇️
2024-10-01
http://j3qxmk6g5sk3zw62i2yhjnwmhm55rfz47fdyfkhaithlpelfjdokdxad.onion/ Screen
⬆️
2025-08-20
http://c3rb3rnow2alp26exjwlrs7puvftcxqywmpqedlierashbqikyxgg3qd.onion Screen

Cactus

Description

Cactus ransomware surfaced in March 2023 and has quickly become one of the fastest-growing and most aggressive ransomware-as-a-service (RaaS) variants. It follows a double-extortion model, encrypting files and threatening to leak stolen data to pressure victims. Cactus is notable for its ability to encrypt its own executable, evading detection by anti-malware tools, and for exploiting vulnerabilities in VPN appliances (e.g., Qlik Sense, Fortinet VPN) to gain initial access. Targets span global enterprises—including Schneider Electric and the Housing Authority of Los Angeles—and the group appears highly adaptable, often deploying the BackConnect persistence tool commonly associated with Black Basta. The ransomware changes file extensions to variants like .cts0 or .cts1, and places a ransom note named cAcTuS.readme.txt.

parsing : enabled

Links

Page title Available Last visit URL Screen
500: Internal Server Error
⬇️
2025-04-07
https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion Screen
⬇️
2025-04-08
https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/ Screen
⬇️
2025-04-28
https://vhfd5qagh6j7qbisjqvly7eejqbv6z5bv77v6yuhctn77wmd3hjkyvad.onion Screen
⬇️
2025-04-28
https://acfckf3l6l7v2tsnedfx222a4og63zt6dmvheqbvsd72hkhaqadrrsad.onion Screen
⬇️
2025-04-08
https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion Screen
⬇️
2025-04-21
https://truysrv2txxvobngtlssbgqs3e3ekd53zl6zoxbotajyvmslp5rdxgid.onion Screen
⬇️
2025-04-16
https://jvtxo5gdcgloguty322ynfnpqkc2whe2jauc7ucm7bzmgct3k7ogr4yd.onion/ Screen

Catb

Description

CatB ransomware was first observed in late 2022, gaining attention for abusing DLL hijacking via the Microsoft Distributed Transaction Coordinator (MSDTC) service—loading a malicious payload through DLL sideloading methods. The malware arrives in a two-stage dropper: the first DLL unpacks and launches the main payload (commonly named oci.dll), which subsequently encrypts files using hybrid RSA/AES cryptography. Unlike conventional ransomware, CatB does not rename files or distribute typical ransom notes; instead, it prepends the ransom message directly to the start of each encrypted file, making detection more difficult. Victims are instructed to contact the attackers via email (e.g., catB9991@protonmail.com or fishA001@protonmail.com), with the ransom demand escalating daily. Initial analysis suggests CatB may be a rebrand or evolution of Pandora ransomware, sharing various code artifacts and operational behavior.

Links

Page title Available Last visit URL Screen

Cerberimposter

Description

Cerber Imposer is a post-2019 rebrand of the Cerber ransomware family, resurfacing in late 2021 with updated targeting of enterprise environments. Unlike its classic counterpart, Cerber Imposer utilizes the .locked file extension and includes a unique recovery note named __$$RECOVERY_README$$__.html. It does not reuse the original Cerber codebase; instead it borrows branding while operating under new cryptographic implementations and deployment tactics. Threat actors have leveraged known remote code execution vulnerabilities in Atlassian Confluence (CVE-2021-26084) and GitLab (CVE-2021-22205) to deliver this ransomware. The rebranded variant has compromised servers in the U.S., Germany, China, and Russia, indicating a broader scope of targeting than originally seen with early Cerber campaigns.

Links

Page title Available Last visit URL Screen

Cerbersyslock

Description

CerBerSysLock first appeared in December 2017 as a cryptoransomware imposter, leveraging Cerber-style branding to deceive victims. It uses XOR-based encryption to lock files and appends extensions such as .CerBerSysLocked0009881. Victims receive a ransom note titled “HOW TO DECRYPT FILES.txt”, which falsely claims to be from the Cerber ransomware. The note includes an email contact—TerraBytefiles@scryptmail.com—and instructs victims to reference their ID (e.g., "CerBerSysLocked0009881") when communicating. The ransomware is technically linked to the Xorist family and is generally considered an opportunistic, low-profile scam rather than part of a broader Ransomware-as-a-Service (RaaS) operation.

Links

Page title Available Last visit URL Screen

Chaos

Description

Chaos is a rapidly evolving Ransomware-as-a-Service (RaaS) group first observed in early 2025. It is considered distinct and unaffiliated with the Chaos Ransomware Builder that originated around 2021. Known for highly aggressive double-extortion operations, Chaos targets organizations across multiple platforms—Windows, ESXi, Linux, and NAS—with fast, configurable encryption mechanisms and optional partial-file targeting for stealth. Attackers gain access through vulnerabilities, phishing, or brokered credentials, then encrypt files while threatening to leak or destroy stolen data. Notable incidents include the breach of Optima Tax Relief, in which the group exfiltrated 69 GB of sensitive data before encrypting systems.

parsing : enabled

Links

Page title Available Last visit URL Screen
CHAOS
⬆️
2025-08-20
http://hptqq2o2qjva7lcaaq67w36jihzivkaitkexorauw7b2yul2z6zozpqd.onion/ Screen
Index of /
⬇️
2025-07-02
http://httj32vkww42kq3kjbsbuuv2izalkvswuyf5hepdodakrjq42ploe6ad.onion/ Screen
Index of /
⬇️
2025-07-02
http://2yxf2ald2c67twt4663piypum2fu6yt4su453naxsdiilpd4m7pgu6qd.onion/ Screen
Index of /
⬇️
2025-06-09
http://k6wtpxwq72gpeil5hqofae7yhbtxphbkyoe2g7rwmpx5sadc4sgsfvid.onion/ Screen
Index of /goosehead/
⬆️
2025-08-20
http://qf4p6ul3g7wyvynkxawlu7ganvgbk44myl35jqfa3aroass33dbvmdyd.onion/goosehead Screen
CHAOS
⬆️
2025-08-20
http://cdgi6zjox6zr5epk7k5rg673qduxy7dlkk7ws3n4vusspr5bmhx24aqd.onion/ Screen
Index of /
⬇️
2025-07-02
http://bna6mhximutqknymisjbp277swmhf7gocambh6y62qmdtup34unjs7yd.onion/ Screen
Index of /
⬇️
2025-07-02
http://een55qvybeygshxbblvfevk6uzcs6lhpj6num7ymbpw7z6cehozszlad.onion/ Screen

Cheers

Description

Cheers is a Linux-based ransomware variant observed starting in May 2022, engineered specifically to target VMware ESXi servers. The malware was developed from leaked Babuk ransomware source code and leverages the SOSEMANUK stream cipher combined with ECDH key exchange for encryption. It terminates all running virtual machines before renaming and encrypting log files and VM-related extensions—like .vmdk, .vmsn, and .vswp—appending a .Cheers extension. A ransom note titled "How To Restore Your Files.txt" is dropped per directory. The ransomware is attributed to the Chinese-affiliated group BRONZE STARLIGHT (also known as Emperor Dragonfly, DEV-0401), which has previously deployed other strains like Rook, NightSky, and Pandora. Cheers targets a range of industry sectors, with confirmed victims across healthcare, finance, logistics, and manufacturing.

parsing : enabled

Links

Page title Available Last visit URL Screen
Cheers!
⬇️
2022-09-20
http://rwiajgajdr4kzlnrj5zwebbukpcbrjhupjmk6gufxv6tg7myx34iocad.onion/ Screen
⬇️
Never
http://crkfkmrh4qzbddfrl2axnkvjp5tgwx73d7lq4oycsfxc7pfgbfhtfiid.onion/

Chilelocker

Description

ChileLocker first emerged in August 2022 and is considered part of the broader ARCrypter ransomware family. It employs a double-extortion model, encrypting Windows and Linux/VMware ESXi systems and threatening data leaks. ChileLocker uses the NTRU public key cryptosystem for encryption and typically appends the .crypt extension to affected files. Following encryption, it drops a ransom note—often named readme_for_unlock.txt—and directs victims to a password-protected Tor negotiation portal, with the password provided in the note. The group also disables recovery mechanisms by deleting shadow copies. Its initial access tactics include exploitation of misconfigured RDP access, phishing, malicious installers, botnets, fake updates, and malvertising. The ransomware has impacted victims across various regions, including Chile, Mexico, Canada, Spain, and others.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://z6vidveub2ypo3d3x7omsmcxqwxkkmvn5y3paoufyd2tt4bfbkg33kid.onion
⬇️
Never
http://ebljej7okwfnx5hdfikqqt2uqehihqv3yns3ziij5clqpklwb3i2cxad.onion/
⬇️
Never
http://7wa2bi6grhbu4opt5bguga4g63jsxiy3ysfbabh7dbyk3niqxlsburad.onion/

Chort

Description

Chort is a relatively new data-extortion ransomware group that surfaced in late 2024, with confirmed activity beginning in October–November 2024. It operates under a double-extortion model—exfiltrating sensitive data before encrypting systems—and organizes victims via a Tor-hosted data leak site (DLS). The group has targeted organizations in the U.S. education sector (including schools and nonprofits) and in Kuwait's agriculture sector, among others. Technical behaviors include execution via PowerShell and removal of shadow copies to disrupt recovery. The group's approach emphasizes public pressure through data exposure rather than technical innovation.

parsing : enabled

Links

Page title Available Last visit URL Screen
Captcha
⬇️
2024-12-27
http://hgxyonufefcglpekxma55fttev3lcfucrf7jvep2c3j6447cjroadead.onion Screen

Cicada3301

Description

Cicada3301 is a sophisticated Ransomware-as-a-Service (RaaS) group that emerged in June 2024. It’s written in Rust and supports cross-platform operations, targeting Windows, Linux, VMware ESXi, NAS, and even PowerPC systems. Technically, its ransomware shares many traits with BlackCat/ALPHV, such as use of ChaCha20 encryption, Rust-based structure, similar configuration interfaces, and methods for shutting down virtual machines and deleting snapshots. Cicada3301 also implements double-extortion tactics—encrypting or exfiltrating data and publishing it on Tor-based leak sites. The group appears to have established an affiliate program, demonstrated through their deployment interfaces and recruitment tactics via forums like RAMP. Operations are believed to be highly professional, possibly involving former ALPHV developers or affiliates.

parsing : enabled

Links

Page title Available Last visit URL Screen
Cicada3301
⬆️
2025-08-20
http://cicadabv7vicyvgz5khl7v2x5yygcgow7ryy6yppwmxii4eoobdaztqd.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ Screen
Cicada3301
⬇️
2025-01-03
http://cicadaxousmk6nbntd3ucxefmfgt2drhtfdvh7gmdeh3ttvudam6f2ad.onion Screen
Cicada3301
⬆️
2025-08-20
http://cicadafhqpjwm2sblkfbuwn7sglbibuejr3m7fildpqpjv3hghlhb4id.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://zf6bl4dczp5z7uaba2lhm5wrhrpflwvzsx2nhf7zyf63tpsfzc54tbad.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://hgannromwuui7n2jvphpteposc3gioqkuo2ncb6fzopasgcq7ixcjeqd.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://osd6tsgegts2xaqo3o2hrpqatwlslqfyc3msvyksad4iucauif3oqqad.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://uds75egfqi7mfpxckf2un742qsj6rh3kfrydqaldwgkrqp2a37lk6fyd.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://wuyfbttjjzsmr5ghl5hoi75ytse3bwrqgk63c6guv3lhw7hwtxbgveid.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://bmfyfxl74qb6rsukgwymv7e22ua4uvhszsamqwx7jmj57qkamxwlhbid.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://yaoehn32c2s5pwsuzhaa4lsu2a4seycpwyvn5gfz3bn4i74t2jo3frad.onion/ Screen
Cicada3301
⬇️
2025-05-09
http://5atqn4dwosjauijzj445mm7t6bqrcvzlzcylpmpnx243jxvlimyb6aid.onion/ Screen
Cicada3301
⬇️
2025-08-20
http://ruzislhpcuvfzw3t2xfqu7gog3gs5j2u65ysaq3ybqkzri3hjddaqgad.onion/ Screen
⬇️
Never
http://leakshrlgof456tiw4ww5moiqlnrcork7q7r3cjgmsvex6zazpluhlad.onion/ec49pw6bi8xc2mk3j89kkiaa4ikdrf4wnq2nas4cseciagbw5pq63th7cqajky3c/
⬆️
2025-08-20
http://cicadapkh4vg2qh4qcoelszhftota5cdcgrwbjcesdyiwjwmsfzgobid.onion Screen

Ciphbit

Description

CiphBit is a crypto-ransomware first detected in April 2023. It utilizes a double-extortion model, encrypting files and threatening to leak stolen data via a Tor-hosted portal if ransom demands are not met. The malware appends encrypted files with a vector including a unique victim ID, the attacker’s email address (onionmail.org), and a four-character random extension—making file identification and recovery especially difficult. Victims span various sectors including banking, manufacturing, healthcare, logistics, and professional services across North America and Europe. The group is classified as a data broker due to its evolving extortion methods involving free leaks and selective leaks to pressure victims. Recent high-profile victims include iptelecom GmbH (Germany) and Therma Seal Insulation Systems (USA), reaffirming its cross-industry reach and impact.

parsing : enabled

Links

Page title Available Last visit URL Screen
CiphBit Data Leak
⬆️
2025-08-20
http://ciphbitqyg26jor7eeo6xieyq7reouctefrompp6ogvhqjba7uo4xdid.onion/ Screen
Sonar - Encrypted communications
⬆️
2025-08-20
http://sonarmsng5vzwqezlvtu2iiwwdn3dxkhotftikhowpfjuzg7p3ca5eid.onion/contact/CiphBit Screen
⬇️
Never
http://ciphbitekvxj27jmtw5sncirfrhxrh4cw4a5qw7ef6o4vqfy4habxbyd.onion

Cloak

Description

Cloak is a cybercriminal ransomware group that first appeared publicly in mid-2023, operating with a double-extortion model. It deploys an ARCrypter variant derived from Babuk, delivered via loaders that terminate security and backup services, delete shadow copies, and install encrypted payloads using algorithms like HC-128 combined with Curve25519 key generation. Victims include entities such as the Virginia Attorney General’s Office, whose IT systems were disrupted and whose data (134 GB) was exfiltrated and listed on Cloak’s Tor leak site. Cloak has been linked to other ARCrypter variants like Good Day, sharing victim portals and infrastructure. Its operations reportedly use initial access brokers, phishing, malvertising, and exploit kits for network infiltration.

parsing : enabled

Links

Page title Available Last visit URL Screen
403 Forbidden
⬇️
2025-08-20
http://cloak7jpvcb73rtx2ff7kaw2kholu7bdiivxpzbhlny4ybz75dpxckqd.onion Screen
⬇️
Never
http://6mw4yczxeqoiq7rgwnpi75qxsjd5jykuutpatflybodwlckoarhfdlid.onion/
⬇️
2024-12-18
http://7puvv4qtcrigzbxshqibkpibzbmrs6thb7s6uf3tisqfp3t2ddpp66id.onion/
⬇️
Never
http://jpef6snenchj3rxgugsozky3i34q66vmcoqy7neyu37xxiwxrad5doid.onion
403 Forbidden
⬆️
2025-08-20
http://glrw7ip5gz2fv2njbiqfvg5uiwavllw5zuixko4yrpj5hta7fjwqpjqd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://vicjwr6abknvcfjomocyb3koloidahc3hidwt5sq2ytwk7yepwfzlsid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://puzhh5aykks65qneqantprbqjt6k5bnigmwqwv6yvkxvkfu4ivva5mid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://piatupks5hai3oafo66xlj2eg2fbzjqy2j7gy3nyhqmnthlrwvrsolad.onion Screen
403 Forbidden
⬆️
2025-08-20
http://necnstpnzuaovjocmiuv7ned7bstczit3kkvotqxl53xo5rfohndlvid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://ey2eak3vq5zbeu4s56m25mm4kvszy2is7gyjs6tsfzmhptbyijkzn2yd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://b53cqorlo7uftd3ymxguwnn7rfoz54ryoojjqxowdsaw2bahvuppntyd.onion Screen
403 Forbidden
⬇️
2025-08-20
http://l3bbtg2p2gp2x43e2nngzkf7ab52k4mef3saowrl6m5notkts7p2vfyd.onion Screen
403 Forbidden
⬇️
2025-08-20
http://vsdp5gqwrunytxw4f6dbxznux66aaewlwyenw3rantba4lwyzbckgfid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://a6gq22ngckken4xksz5ytl66sqeylh45ktke5pnbzfdksw5sfum5lvqd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://nbfxtlikrnicuht5yvvhlujpnh3spzjmek6eujeyck2ws34yytxjdhyd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://ziburuf5kh4phq5i6nmukpke7uruflhlvfexfmjwiwgghapz6ug3ajyd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://am3mzzguimx45wxywpukvwf3gobt3r4bidxzntjpsmqqge4s3vi2vvid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://occwme3xtlnzk3nlhn5ewsgodswrp6pysmmk7kcxqgj4hyiwkhoqcuyd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://qyywpuxysuur4exynwwwhu6nbd2f5vpj3h4tjbltfhwd4blamd4fppqd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://hsn2e745m36crxj2gmnrp432vbsyarhwvq3fgcyus345dp3oqlrltuad.onion Screen
403 Forbidden
⬆️
2025-08-20
http://pbbeck4xcy3jzbu6lv5db3c5n3n44wngmpb5jj3yo4px32mlznziwbid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://hmxt5u75kj5qxqjqhckgaoda6zndgxcazleersyioat4iuq3ldgmkcid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://cii64fki62v2mudocjvgarzlmnpqrfp6xb7korapmdd7qmjpnccgduyd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://jrmayo7rvsx6sbv36djpdge6iwuem67dhccpctera2ykmqr6kplhayad.onion Screen
403 Forbidden
⬆️
2025-08-20
http://ljrswxeei4isir3s5i7xmlzpx6sabmkgd7mvjrimcqwu7rqpn7bdjfad.onion Screen
403 Forbidden
⬆️
2025-08-20
http://qixf7fqw237ikunw4ey22jsc4deltducf6zn4mq4ldyqab3ij3gehlyd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://ztqugnw4upfmd6mu3l6sdz2mfvzxzouhwgqqowyjeedgsmz733dqq2ad.onion Screen
403 Forbidden
⬆️
2025-08-20
http://u66kitj46wmr5onijbbkg7cq45crcs66c563kyqy6klxm5c2nz42ujid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://e7gxrudyx2o733zlernyqqv623wyky5teor5xhnnx2g6dt4vf6jwn2yd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://qx2b2on5phkj4jczfpzfkb5cuhxn7wfqbgdu27pmxyzamoim3jqff6qd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://37izr5yow5d673agew22miyy3inbqncuv7gfp5372yciuzvadqef66yd.onion Screen
⬇️
Never
http://d2wqt4kek62s35hjeankc75nis4zn4e5i6zdtmfkyeevr7fygpf2iiid.onion
403 Forbidden
⬆️
2025-08-20
http://sclj2rax5ljisew3v4msecylzo7iieqw25kcl7io4szei4qcujxixaid.onion Screen
403 Forbidden
⬆️
2025-08-20
http://xyy2fymbdytltylyuicasuvw7vw3gtgm3cvvjskh4jnzfg3gp7dqgnqd.onion Screen
403 Forbidden
⬆️
2025-08-20
http://heac3upmfv33scnkeek64dqdx2cblv7z256aezluyvgtwsxi2o3coiid.onion/ Screen
403 Forbidden
⬆️
2025-08-20
http://uss2a5zyeth7sop57zhgqcyafmnbkmoknps3i7anusze77zppp4bf5yd.onion/ Screen
⬇️
Never
http://vir3qwnhwtdriaejfsav6fu5y5ikqlyp5ml345eenlk4pxgabqpf4iid.onion/
⬇️
2025-04-28
http://67cw3reg2revettu2xfhaaaxhoukctplr6u6mhzri5x6uflet5bq56ad.onion Screen

Cloak.Su (Locker Leak)

Links

Page title Available Last visit URL Screen
Bitz Casino — официальный сайт и рабочее зеркало Битс Казино для игры онлайн
⬆️
2025-08-20
http://cloak.su/indexo.php Screen

Clop

Description

Clop is a ransomware which uses the .clop extension after having encrypted the victim's files. Another unique characteristic belonging with Clop is in the string: "Dont Worry C|0P" included into the ransom notes. It is a variant of CryptoMix ransomware, but it additionally attempts to disable Windows Defender and to remove the Microsoft Security Essentials in order to avoid user space detection.

parsing : enabled

Links

Page title Available Last visit URL Screen
HOME | CL0P^_- LEAKS
⬇️
2022-08-19
http://ekbgzchl6x2ias37.onion Screen
DDOS Protection
⬇️
2025-08-20
http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/ Screen
⬇️
2024-12-15
http://3ws3t4uo7fehnn4qpmadk3zjrxta5xlt3gsc5mx4sztrsy7ficuz5ayd.onion/ Screen
⬇️
2024-12-15
http://amnwxasjtjc6e42siac6t45mhbkgtycrx5krv7sf5festvqxmnchuayd.onion/ Screen
403 Forbidden
⬇️
2024-12-15
http://qahjimrublt35jlv4teesicrw6zhpwhkb6nhtonwxuqafmjhr7hax2id.onion/ Screen
404 Not Found
⬇️
2025-01-22
http://npkoxkuygikbkpuf5yxte66um727wmdo2jtpg2djhb2e224i4r25v7ad.onion Screen
⬇️
2025-01-22
http://6v4q5w7di74grj2vtmikzgx2tnq5eagyg2cubpcnqrvvee2ijpmprzqd.onion/remote0/ Screen
403 Forbidden
⬆️
2025-08-20
http://l4rdimrqyonulqjttebry4t6wuzgjv5m62rnpjho3q22a6maf6d5evyd.onion/ Screen
⬆️
2025-08-20
http://frgp3f3u2ddafv4ny7tqn6tc674m6fyymyywoaxot7xskbjmiyhhsyqd.onion/ Screen
⬆️
2025-08-20
http://htmxyptur5wfjrd7uvg23snupub2pbtlfelk45n37b3augl2w4eearid.onion/remote0/ Screen
403 Forbidden
⬇️
2025-08-20
http:///2vi357dgf4246nvrcsavrt5jsrm7pfqim4t2n3ykzedjim5bzqezmlyd.onion Screen

Clop Torrents

parsing : enabled

Links

Page title Available Last visit URL Screen
TORRENT | CL0P^_- LEAKS
⬇️
2024-07-15
http://toznnag5o3ambca56s2yacteu7q7x2avrfherzmz4nmujrjuib4iusad.onion/ Screen

Colossus

Description

Colossus ransomware was first observed in September 2021, when ZeroFox researchers uncovered the variant attacking a U.S.-based automotive group. It employs a double-extortion model, using Themida packing and sandbox evasion to disable defenses and deliver encrypted payloads. Victims are urged to visit a support site—hosted at a domain like colossus.support—to negotiate payment, or face large-scale data dumps and increasing ransom amounts tied to countdown timers. Operators demonstrated familiarity with RaaS playbooks, drawing architectural parallels to groups like EpsilonRed, BlackCocaine, and REvil/Sodinokibi.

Links

Page title Available Last visit URL Screen

Contfr

Description

Launched around September 2024, ContFR is a French-speaking RaaS that uses a Tor-hosted platform to provide ransomware embedded in PDF files (targeting both Windows and macOS). The group offers a tiered subscription model—“TEST,” “BASIC,” and “ELITE”—allowing affiliates varying degrees of customization, offline capability, and support based on the package purchased. As of the latest reporting, no victims are publicly listed, though data leak publications likely require a subscription to access. The operation suggests an organized, business‑like structure, distinct from opportunistic one‑off strains.

Links

Page title Available Last visit URL Screen
ContFR - RAAS
⬆️
2025-08-20
http://zprxx7sfc26rufggreanowmme5qqouqegr2efnko6erycquwvpq5egid.onion/ Screen

Conti

Description

Conti is an extremely damaging ransomware due to the speed with which it encrypts data and spreads to other systems. It was first observed in 2020 and it is thought to be led by a Russia-based cybercrime group that goes under the Wizard Spider pseudonym. In early May 2022, the US government announced a reward of up to $10 million for information on the Conti ransomware gang.

Links

Page title Available Last visit URL Screen
CONTI.News
⬇️
2022-06-21
http://continewsnv5otx5kaoje7krkto2qbu3gtqef22mnr7eaxw3y6ncz3ad.onion/
continews.click
⬇️
2023-10-26
http://continews.click Screen
None
⬇️
Never
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion/
None
⬇️
Never
http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/
None
⬇️
Never
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
None
⬇️
Never
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion
None
⬇️
Never
https://contirecovery.best
None
⬇️
Never
https://contirecovery.top
None
⬇️
Never
http:// htcltkjqoitnez5slo7fvhiou5lbno5bwczu7il2hmfpkowwdpj3q2yd.onion/

Cooming

Description

previous clearnet domain coomingproject.com

parsing : enabled

Links

Page title Available Last visit URL Screen
CoomingProject announcement
⬇️
2022-02-05
http://z6mikrtphid5fmn52nbcbg25tj57sowlm3oc25g563yvsfmygkcxqbyd.onion
None
⬇️
2021-05-01
http://teo7aj5mfgzxyeme.onion

Core

Description

Core ransomware surfaced in early 2025 as a new variant within the broader Makop family. It employs a single-extortion model, focusing on encrypting files and demanding payment, without public data-leak threats. The malware appends the .core extension to encrypted files and is delivered via typical exploit vectors known to RaaS campaigns. Core does not showcase advanced double-extortion tactics seen in other modern strains, but it stands out for its familial lineage and continued evolution from Makop ancestors.

Links

Page title Available Last visit URL Screen

Crazyhunter Team

Description

CrazyHunter is a rising ransomware threat first detected in early 2025, with particularly dangerous campaigns targeting Taiwanese critical infrastructure sectors such as healthcare, education, manufacturing, and industrial services. Technically sophisticated, its toolkit is composed of approximately 80% open-source tools, including the Prince Ransomware Builder (for encryption), ZammoCide (for defense evasion via BYOVD techniques), and SharpGPOAbuse (enabling lateral movement via Group Policy). In a notable incident like the February attack on Mackay Memorial Hospital, attackers employed a USB-based infection vector, then escalated privileges using vulnerable signed drivers (e.g., zam64.sys) to disable security defenses. The ransomware appends extensions like .Hunted3 and displays “Decryption Instructions.txt” as ransom notes. The group maintains a data leak site where it publicly claims multiple Taiwanese organizations as victims.

parsing : enabled

Links

Page title Available Last visit URL Screen
Crazyhunter
⬇️
2025-04-03
http://7i6sfmfvmqfaabjksckwrttu3nsbopl3xev2vbxbkghsivs5lqp4yeqd.onion/ Screen

Crosslock

Description

CrossLock ransomware was first observed in April 2023, targeting an IT services firm in Brazil using a double‑extortion approach—encrypting data and threatening to leak it publicly. Written in Go, it uses a hybrid encryption scheme combining ChaCha20 for file encryption with Curve25519 for key protection. Victims see their files renamed with the .crlk extension and ransom notes titled ---CrossLock_readme_To_Decrypt---.txt. The malware includes advanced techniques like Event Tracing for Windows (ETW) bypass and process mimicking (e.g., Cybereason processes) for stealth. It was publicly tracked until July 2023, after which activity (and its leak site) went offline.

parsing : enabled

Links

Page title Available Last visit URL Screen
Cross Lock - Data leak
⬇️
2023-07-28
http://crosslock5cwfljbw4v37zuzq4talxxhyavjm2lufmjwgbpfjdsh56yd.onion/ Screen

Cryakl

Description

also known as “Fantomas”. Cryakl first appeared in 2014, spreading primarily across Eastern Europe and Russia via phishing emails with malicious attachments. It uses an asymmetric RSA-based encryption scheme, appending victim-specific IDs and contact emails into filenames and ransom notes. The ransomware operates under a RaaS-like model, distributing builds to affiliates for broader dissemination. In 2018, Belgian law enforcement seized Cryakl’s command-and-control infrastructure and recovered decryption keys, enabling victims to restore files via free tools like Kaspersky’s RakhniDecryptor and the NoMoreRansom project.

Links

Page title Available Last visit URL Screen

Crylock

Description

CryLock is a ransomware variant that emerged around April 2020, evolving from the Cryakl (Fantomas) ransomware family. It follows a semi-affiliate model, offering customizable options for partners—such as variable encryption routines, network scanning for lateral movement, shadow copy deletion, and process termination—and flexible delivery methods. During encryption, CryLock renames files to include the developer email, a unique victim ID, and a randomized three-letter extension. Victims typically encounter a countdown timer in a pop-up ransom message that warns about escalating ransom costs and potential loss of decryption capabilities.

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://d57uremugxjrafyg.onion

Crynox

Description

Crynox (sometimes referred to as “Crynox Ransomware”) appears to be a generic file-locker threat that appends .crynox to encrypted files and drops a ransom note (read_it.txt) instructing victims to contact crynoxWARE@proton.me. It seems to use RSA-4096 and AES for encryption and may change desktop wallpaper, but there's no evidence of double-extortion or leak site operation. Distribution methods cited include phishing, pirated software, and malicious websites.

Links

Page title Available Last visit URL Screen

Cryp70N1C0D3

Links

Page title Available Last visit URL Screen
|*| CRYP70N1C0D3 Team |*|
⬇️
2025-08-19
http://7k4yyskpz3rxq5nyokf6ztbpywzbjtdfanweup3skctcxopmt7tq7eid.onion/databases.html Screen

Crypt Ransomware

Description

.crYpt MD5: 54EFAC23D7B524D56BEDBCE887E11849 Babuk Variant

Links

Page title Available Last visit URL Screen
⬇️
Never
https://lhwhi2kmewfas6tk47psgvqyluz5iwgdll5g6jyknq6rvxxg6soqooqd.onion/

Cryptbb

parsing : enabled

Links

Page title Available Last visit URL Screen
Home
⬇️
2023-09-20
http://crypuglupv3bsqnbt5ruu5lgwrwoaojscwhuoccbmbzmcidft5kiccqd.onion Screen
None
⬇️
Never
http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion

Cryptedpay

Description

CryptedPay is a standalone ransomware strain observed around early 2025, that encrypts files using AES-256 and appends the .CRYPTEDPAY extension. Victims receive a ransom note (README.txt), have their desktop wallpaper changed, and are instructed to pay approximately $280 in Monero (XMR). The ransomware imposes a 62-hour deadline, threatening permanent file loss if not paid.

Links

Page title Available Last visit URL Screen

Cryptnet

Description

CryptNet is a newer Ransomware-as-a-Service (RaaS) operation first identified in April 2023. It follows a double-extortion model, performing data exfiltration before encrypting files. Written in .NET and obfuscated with .NET Reactor, CryptNet utilizes AES-256 (CBC) and RSA-2048 encryption. Its codebase shares strong similarities with Chaos and Yashma ransomware families.

parsing : enabled

Links

Page title Available Last visit URL Screen
CryptNet RECOVERY
⬇️
2023-10-17
http://cryptr3fmuv4di5uiczofjuypopr63x2gltlsvhur2ump4ebru2xd3yd.onion Screen
CryptNet NEWS
⬇️
2023-10-17
http://blog6zw62uijolee7e6aqqnqaszs3ckr5iphzdzsazgrpvtqtjwqryid.onion/ Screen

Crypto24

Description

aka Public Data Storage Crypto24 emerged in early 2025 as a fast-growing double-extortion ransomware-as-a-service (RaaS) group. It targets organizations across industries such as financial services, healthcare, logistics, and technology, with notable victims in Malaysia, Colombia, Egypt, and India. The group executes rapid infiltration—often leveraging stolen credentials—encrypts files (appending the .crypto24 extension), and exfiltrates significant volumes of data (e.g., 2 TB from Vietnam’s CMC Group). Affiliate-oriented operations are indicated by their presence on RAMP forums, suggesting professional recruitment and offering free decryption for small file samples to entice victims.

parsing : enabled

Links

Page title Available Last visit URL Screen
CRYPTO24 | Data Leak Site
⬆️
2025-08-20
http://j5o5y2feotmhvr7cbcp2j2ewayv5mn5zenl3joqwx67gtfchhezjznad.onion/ Screen
⬇️
2025-05-03
http://j5o5y2feotmhvr7cbcp2j2ewayv5mn5zenl3joqwx67gtfchhezjznad.onion:5050/data Screen

Cryptxxx

Description

CryptXXX is a ransomware strain that first appeared in April 2016, developed by the same group behind the Reveton and Angler Exploit Kit operations. It uses a single-extortion model, encrypting victim files with RSA-4096 and AES-256 encryption, appending the .crypt or .crypt1 extensions in early versions, and later variants dropping different extensions. Distribution was largely via the Angler and Neutrino exploit kits, targeting unpatched browsers, plugins, and malicious email attachments. CryptXXX also included credential theft capabilities, harvesting from browsers and FTP clients, and in some variants, a file-stealing module. Notable campaigns affected victims globally, with a strong concentration in North America and Europe. Operations were disrupted in mid-2016 when security researchers from Kaspersky Lab released decryption tools, forcing the group to release updated, harder-to-crack versions.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://apvc24autvavxuc6.onion/

Crysis

Description

Crysis ransomware was first identified in early 2016 and is a long-running family that later evolved into the Dharma ransomware line. It follows a Ransomware-as-a-Service (RaaS) model, allowing affiliates to customize email addresses, extensions, and ransom notes. Crysis primarily spreads via malicious email attachments, remote desktop protocol (RDP) brute-force attacks, and software cracks. It uses strong hybrid encryption—AES for file content and RSA for key protection—and appends various extensions such as .crySis, .wallet, or attacker-specified tags. It also deletes shadow copies to hinder recovery. Over the years, it has targeted businesses and individuals worldwide, with notable prevalence in healthcare, manufacturing, and professional services sectors. In 2017, law enforcement released master decryption keys through the NoMoreRansom project, enabling recovery for earlier versions, though newer builds remain active in the wild.

Links

Page title Available Last visit URL Screen

Cs-137

Description

Cs‑137 is a newly observed ransomware strain that first appeared in January 2025. It employs the ChaCha20 cipher for encryption and appends obfuscated filenames with a random 10-character alphanumeric identifier while preserving the original file extension. In its current testing phase, it drops a ransom note with a randomized filename (e.g. ABCDEF-README.txt) and sets a randomly named image file as the desktop wallpaper. The note references a Tor-based extortion portal—though access is not yet active, indicating the operation’s early development stage. The strategy suggests single-extortion behavior, focused on disrupting access rather than data theft or leak threats.

Links

Page title Available Last visit URL Screen

Ctblocker

Description

aka Critroni CTB‑Locker emerged in mid‑2014, introducing a new era of ransomware by leveraging elliptic curve cryptography (ECC), Tor-based C&C communication, and Bitcoin payments—earning its name from “Curve-Tor-Bitcoin Locker.” It was packaged and sold as a ransomware kit for approximately $1,500–$3,000, allowing affiliates to deploy customized campaigns. The malware encrypts user data (including network and removable drives), changes desktop wallpapers, and appends file extensions like .CTBL, .CTB2, or randomized strings. Victims receive instructions for payment, typically within a limited timeframe, or risk permanent data loss. In 2015–2017, law enforcement and cybersecurity firms (including McAfee and Kaspersky) disrupted the network, arrested operators, and facilitated decryption tools.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://ohmva4gbywokzqso.onion/
⬇️
Never
http://tmc2ybfqzgkaeilm.onion

Cuba

Description

Cuba ransomware, active since at least 2019, is a financially motivated threat group operating a double-extortion scheme—encrypting files and exfiltrating data to pressure victims. It has targeted government agencies, healthcare providers, critical infrastructure, financial institutions, and manufacturing firms, primarily in the United States, Canada, and Europe. Distribution often involves the Hancitor (Chanitor) malware loader, phishing campaigns, and exploitation of vulnerabilities in public-facing services such as Microsoft Exchange. Cuba employs RSA and AES encryption, typically appending the .cuba extension to affected files, and drops ransom notes instructing victims to contact the attackers via Tor-based portals. In December 2021, the FBI reported that Cuba ransomware operators had compromised at least 49 entities in U.S. critical infrastructure sectors, stealing data and demanding multimillion-dollar ransoms.

parsing : enabled

Links

Page title Available Last visit URL Screen
Cuba
⬇️
2022-08-28
http://cuba4mp6ximo2zlo.onion Screen
Cuba
⬇️
2024-02-08
http://cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion/ Screen
⬇️
Never
http://i34gbmo5rxx3bxc4yl7f4erkyo2oldwavhpdragnjjvhni6fwvptp2id.onion
⬇️
Never
https://kcfgfs7cclscxloy3bf2xtwnayimawtzrbfirfbvl47xt7n2brfiizyd.onion/

Cyberex

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://p6lm43x2ntdgx5ixdqfmhrniz7rxv7xtiudbyicwcpir6oeig7jhrfyd.onion
None
⬇️
Never
http://wun2vkbns2ypyxfe7wffycdgbxsym564eamfk27py3pesqxikqpqfoyd.onion

Cyclops

Description

Cyclops ransomware was rebranded as Knight around mid‑2023, emerging initially in early 2023. It operates as a Ransomware-as-a-Service (RaaS), targeting multiple platforms including Windows, macOS, Linux, and ESXi systems. Crafted in Go, it uses strong encryption algorithms like ChaCha20 and Curve25519. Knight includes both a full and "lite" encryptor, supports batch attacks, hosts a Tor leak site, and offers a web portal for affiliates—positioning itself as a scalable and partner-friendly ransomware operation. Affiliates can manage deployments, track payments, and negotiate with victims through a sophisticated RaaS platform.

parsing : enabled

Links

Page title Available Last visit URL Screen
Blog | Knight
⬇️
2023-10-13
http://nt3rrzq5hcyznvdkpslvqbbc2jqecqrinhi5jtwoae2x7psqtcb6dcad.onion/ Screen
⬇️
Never
http://wy35mxvqxff4vufq64v4rrahxltn6ry33hjoogydwti6wbqutjaxrvid.onion/clients/chat/

Cylance

Links

Page title Available Last visit URL Screen

D0Glun

Description

D0glun is a crypto-ransomware strain first observed in January 2025, believed to be derived from Babuk via an intermediary variant known as Cheng Xilun. It uses AES-256 symmetric encryption and appends filenames with patterns such as .@D0glun@<original extension> or similar. The malware encrypts files rapidly, changes the desktop wallpaper, and drops ransom notes typically named @[email protected], Desktopcxl.txt, or help.exe. The campaign has shown signs of shared infrastructure and code reuse from Cheng Xilun, but there is no confirmed evidence of a large-scale or mature operation. Its activity so far suggests it is being tested or deployed by a small group or individual rather than a structured affiliate network.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://33333333h45xwqlf3s3eu4bkd6y6bjswva75ys7j6satex5ctf4pyfad.onion

D4Rk4Rmy

Description

D4rk4rmy is a data-extortion focused threat actor that emerged in mid-2025, targeting high-profile organizations across sectors like financial services, hospitality, and education. It operates primarily through leak site extortion rather than encryption, listing prominent entities—such as Bridgewater Associates, Magellan Financial, Onex Canada Asset Management, Tsai Capital, Casino de Monte-Carlo, and others—on its Tor-based platform. The group has also hit victims in technology, logistics, and university sectors across multiple continents. Their tactic centers on reputation manipulation and public exposure to pressure victims into negotiations.

parsing : enabled

Links

Page title Available Last visit URL Screen
D4RK4RMY – 共产主义勒索软件党
⬆️
2025-08-20
http://d4rkd2fybtclo44hss2dpqpw7gmofboxhruax2az3uejw7puxxbpkvqd.onion/ Screen

Dagonlocker

Description

Dagon Locker is a double-extortion ransomware family that surfaced around September 2022. It represents an evolution of the MountLocker and Quantum ransomware lines. The group employs strong encryption using ChaCha20 protected by RSA-2048 and appends the .dagoned extension to encrypted files. It provides operators flexibility through command-line options to control encryption behavior, such as skipping logs, deletions, or process termination. Notably, Dagon Locker is frequently distributed via phishing campaigns and as part of Brodin-based initial access chains. It operates under a Ransomware-as-a-Service (RaaS) model, engaging affiliates to launch customized campaigns—particularly targeting organizations in South Korea.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://dgnh6p5uq234zry7qx7bh73hj5ht3jqisgfet6s7j7uyas5i46xfdkyd.onion/?cid=

Daixin

Description

Daixin Team is a ransomware and data extortion group active since at least June 2022, known for targeting the healthcare sector, including hospitals, clinics, and related service providers. The group employs a double-extortion model—exfiltrating sensitive data before encrypting systems—and has leaked protected health information (PHI) to pressure victims. Intrusions often involve exploiting VPN vulnerabilities (notably in Fortinet FortiOS) and using compromised credentials for initial access. The ransomware uses AES for file encryption with RSA to protect the keys, and ransom notes direct victims to a Tor-based portal. The U.S. CISA, FBI, and HHS have issued joint advisories warning of the group’s impact on healthcare delivery and patient safety

parsing : enabled

Links

Page title Available Last visit URL Screen
Data Leak
⬆️
2025-08-20
http://7ukmkdtyxdkdivtjad57klqnd3kdsmq6tp45rrsxqnu76zzv3jvitlqd.onion/ Screen
⬇️
Never
http://232fwh5cea3ub6qguz3pynijxfzl2uj3c73nbrayipf3gq25vtq2r4qd.onion
Data Leak
⬆️
2025-08-20
http://7ukmkdtyxdkdivtjad57klqnd3kdsmq6tp45rrsxqnu76zzv3jvitlqd.onion Screen
⬇️
2025-05-23
http://htz6biyazjyzzxllx4knuvux26xa2ixyjshjtwtgq4cm3vczylikm3id.onion Screen
⬇️
Never
http://kolbh6putvp6aw3vpmsppor4kyzs7ctxfbp2donetycftz5jru73ytid.onion
⬇️
Never
http://kyk6lixosktvbtf3g6zte7kdzid2lwrprfod55mhwunafx6jzeoui7yd.onion
⬇️
Never
http://pkx3r7xe42z7fgkjjbocf7okdh77bsvngwvp6arykksob7gleyswicyd.onion
⬇️
Never
http://qlfnwdg2fyvmzmqkk33iwku32ynsbbk6hysorsvvadr4o7gfzs4t46yd.onion
⬇️
Never
http://r3h2balq6aa7plwe5p5bhxzwzxusrtldbfaamfseg33a5hk77bohzxyd.onion
⬇️
Never
http://v66nzl27xxmrulq6c2plrzr7tryv2idflhclpoyxrrn3kfw5gkkpveid.onion
Index of /data/gift1/
⬇️
2025-05-23
http://htz6biyazjyzzxllx4knuvux26xa2ixyjshjtwtgq4cm3vczylikm3id.onion/data/gift1/ Screen

Dan0N

Description

dAn0n is a data-extortion actor that first appeared in April 2024. Operating primarily in a leak-focused extortion model, they publish stolen data on a Tor-hosted site rather than encrypting files. Their victims include organizations across sectors like business services, technology, healthcare, transportation, and legal—all largely based in the United States, with a few in Ireland and South Korea. Activity surged in May 2024, landing them in the top 10 most active ransomware actors that month. Despite limited branding efforts, their smaller operational footprint has allowed for swift, targeted breaches that prioritize rapid data exposure over elaborate cryptographic tactics.

parsing : enabled

Links

Page title Available Last visit URL Screen
dAn0n
⬇️
2024-10-26
http://2c7nd54guzi6xhjyqrj5kdkrq2ngm2u3e6oy4nfhn3wm3r54ul2utiqd.onion/ Screen

Dark Power

Description

Dark Power is a ransomware group first observed in January 2023, known for targeting small to mid-sized organizations across education, healthcare, manufacturing, and information technology sectors. The group uses a double-extortion model, encrypting files and threatening to leak exfiltrated data via a Tor-based site if ransom demands are not met. Written in the Nim programming language, Dark Power ransomware appends the .dark_power extension to encrypted files and drops a ransom note named README.txt, giving victims 72 hours to contact them. The note typically demands payment in cryptocurrency and offers to negotiate. Victims have been observed in North America, Asia, and Europe, with attacks often involving exploitation of vulnerable public-facing systems or stolen credentials.

parsing : enabled

Links

Page title Available Last visit URL Screen
Dark Power Ransomware
⬇️
2023-03-15
http://powerj7kmpzkdhjg4szvcxxgktgk36ezpjxvtosylrpey7svpmrjyuyd.onion/ Screen

Darkangel

Description

Dark Angels is a highly targeted ransomware and data-extortion group that emerged in spring 2022. Rather than using an affiliate-driven model, it orchestrates discreet, high-impact attacks on large organizations—often choosing one Fortune-level victim at a time. The group exfiltrates massive volumes of data (sometimes 10–100 TB), optionally deploys encryption on Windows or ESXi systems, and pressures victims via a Tor-hosted leak platform ("Dunghill Leak"). Their notable incidents include extorting a record $75 million from a Fortune 50 company in 2024 and demanding around $51 million from Johnson Controls. Dark Angels’ operations emphasize stealth and precision over disruption, often avoiding high-profile media exposure and operating with low operational visibility.

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
https://wemo2ysyeq6km2nqhcrz63dkdhez3j25yw2nvn7xba2z4h7v7gyrfgid.onion/

Darkbit01

Description

DarkBit is a politically motivated ransomware operation active since February 2023, targeting academic and public sector entities—most notably including attacks against Israeli institutions like the Technion. Written in Go (Golang) and leveraging powerful encryption routines, it employed AES-256 and supported command-line options for customizable deployments. Its behavior includes deleting volume shadow copies and encrypting files with a randomized prefix and .Darkbit extension. The group deployed their own Tor-based negotiation portal and utilized Tox messaging for communication. Their messaging contained anti-government rhetoric, suggesting ideological motivations in addition to cyber-extortion objectives.

Links

Page title Available Last visit URL Screen
Error
⬇️
2023-02-15
http://iw6v2p3cruy7tqfup3yl4dgt4pfibfa3ai4zgnu5df2q3hus3lm7c7ad.onion Screen
DarkBit
⬇️
2023-02-15
http://iw6v2p3cruy7tqfup3yl4dgt4pfibfa3ai4zgnu5df2q3hus3lm7c7ad.onion/support/ Screen

Darkhav0C

Description

Links

Page title Available Last visit URL Screen
⬇️
Never
http://afiocd14efgh5hu8ijkl9012m.onion

Darkrace

Description

DarkRace is a moderately destructive ransomware strain observed since 2024. It encrypts files and appends a randomized extension (e.g., .1352FF327) that varies per victim. Implemented as a 32-bit Windows application, it disables antivirus defenses, deletes volume shadow copies, terminates processes, and drops ransom note files for payment negotiation. Technical weaknesses in its encryption have enabled developers to produce a universal decryptor that works against DarkRace and related variants.

parsing : enabled

Links

Page title Available Last visit URL Screen
404 Not Found
⬇️
2023-06-21
http://wkrlpub5k52rjigwxfm6m7ogid55kamgc5azxlq7zjgaopv33tgx2sqd.onion/ Screen

Darkrypt

Links

Page title Available Last visit URL Screen
None
⬇️
Never
https://darkrypt.io

Darkside

Description

FireEye describes DARKSIDE as a ransomware written in C and configurable to target files whether on fixed, removable disks, or network shares. The malware can be customized by the affiliates to create a build for specific victims.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion
None
⬇️
Never
http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/
None
⬇️
Never
http://darksidedxcftmqa.onion/

Darkvault

Description

DarkVault is a versatile and opportunistic threat actor first observed in late 2023. Rather than being a traditional ransomware operation, it acts broadly as a data broker and extortion ensemble, publishing victim information—like company names and industries—via Tor-leak sites. Activities reportedly include doxing, website defacement, bomb threats, malware distribution, and swatting, suggesting a diversified cybercriminal portfolio beyond simple ransomware, often framed as an "exclusive online community." While the leak site design mirrors LockBit 3.0, there is no verified technical evidence linking DarkVault to LockBit's codebase. No ransomware executables or encryption tools have been confirmed; its role appears centered on data exposure and extortion without enforced file encryption.

parsing : enabled

Links

Page title Available Last visit URL Screen
DarkVault BLOG
⬇️
2025-01-16
http://mdhby62yvvg6sd5jmx5gsyucs7ynb5j45lvvdh4dsymg43puitu7tfid.onion Screen
403 Forbidden
⬇️
2025-01-16
http://kkvanuf7on5uglvdhihy627w5pxwcmhl6pxik7rwef6y7crt6wj4hjqd.onion/ Screen

Darkwave

Description

Written in python

Links

Page title Available Last visit URL Screen
DarkWave
⬆️
2025-08-20
http://sm76tw7iliyprkyeywcac4s6fnqrkyujyezi3xdr4bkebz5edi2kh6ad.onion/ Screen

Darkylock

Description

Darky Lock is a commodity-style ransomware strain first identified in July 2022, derived from publicly available Babuk source code. Victim systems undergo file encryption with an added “.darky” extension, and a “Restore-My-Files.txt” ransom note is placed in all impacted locations. The malware attempts to disable backup mechanisms, including shadow copies and specific applications. Its distribution leverages phishing and trojanized installers, complemented by payloads dropped via frameworks like Empire, Metasploit, and Cobalt Strike.

Links

Page title Available Last visit URL Screen

Datacarry

Description

DataCarry is a newly observed ransomware and data-extortion operation, first seen in May 2025. It operates a double-extortion model, exfiltrating data and threatening publication via a Tor-hosted portal. The group has already claimed multiple victims across diverse sectors including insurance, healthcare, real estate, retail, and aerospace in countries such as Latvia, Belgium, Türkiye, South Africa, Switzerland, Denmark, and the United Kingdom. The rapid emergence and multi-country reach signal a well-organized operation.

parsing : enabled

Links

Page title Available Last visit URL Screen
DATACARRY
⬆️
2025-08-20
http://dcarryhaih5oldidg3tbqwnde4lxljytnpvberrwgj2vlvunopd46dad.onion/ Screen

Dataf Locker

Description

DataF Locker is a ransomware variant first observed in 2024, closely tied to the Babuk ransomware lineage. It operates under a double-extortion model, encrypting files by appending the .dataf extension and threatening to leak exfiltrated data if the ransom isn't paid. Victims receive a ransom note named How To Restore Your Files.txt, with satisfaction of specified recovery procedures. Observations suggest use of typical intrusion vectors such as phishing, exploit tools, or leaked credential abuse, although detailed delivery methods and leak infrastructure remain under-documented in high-tier intelligence reports.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://pg3n5bteiatjf6rt7oa4xhzo4sj736rifjmk4gtowxjljuwwdv6mccyd.onion/

Dataleak

parsing : enabled

Links

Page title Available Last visit URL Screen
DataLeak
⬇️
2023-02-22
http://woqjumaahi662ka26jzxyx7fznbp4kg3bsjar4b52tqkxgm2pylcjlad.onion/ Screen
⬇️
2023-02-22
http://woqjumaahi662ka26jzxyx7fznbp4kg3bsjar4b52tqkxgm2pylcjlad.onion/atom.xml Screen

Deadbydawn

Links

Page title Available Last visit URL Screen

Deathgrip

Description

DeathGrip is a Ransomware-as-a-Service (RaaS) that emerged around June 2024, offering malware payloads built with leaked LockBit 3.0 and Yashma/Chaos builders. Designed to lower technical barriers, it enables even low-skilled operators to deploy highly capable ransomware attacks. DeathGrip campaigns typically employ AES-256 encryption, delete shadow copies and recovery features, and modify system settings to hinder restoration. Earlier infections include low-tier ransom demands (e.g., around $100), reflecting entry-level targeting, though its flexible tooling allows a range of payload configurations.

Links

Page title Available Last visit URL Screen

Deathransom

Description

DeathRansom is a ransomware family first seen in the wild in late 2019, initially appearing as a bluff—dropping ransom notes without actually encrypting files. By early 2020, the malware evolved into a functional encryptor, using a hybrid scheme of AES for file encryption and RSA to secure AES keys. Infected systems have files appended with extensions such as .wctc or .zzz depending on the campaign variant. Distribution methods include phishing emails with malicious attachments, cracked software downloads, and malicious spam campaigns. Over time, some DeathRansom operations were linked to STOP/Djvu infrastructure and later incorporated into affiliate-based criminal ecosystems.

Links

Page title Available Last visit URL Screen

Delta

Links

Page title Available Last visit URL Screen

Desolated

Description

Links

Page title Available Last visit URL Screen

Devman

Description

DevMan is a ransomware variant first observed in April 2025. It is a customized derivative of the DragonForce family, leveraging attacker-operated infrastructure for double-extortion, where both data theft and encryption are employed to pressure victims. The threat is highly organized, targeting sectors such as technology, construction, public services, healthcare, and consumer services across Asia, Africa, and Europe.

parsing : enabled

Links

Page title Available Last visit URL Screen
Devman's Place
⬇️
2025-06-16
http://qljmlmp4psnn3wqskkf3alqquatymo6hntficb4rhq5n76kuogcv7zyd.onion/ Screen

Devman2

Description

DevMan 2.0 is the evolved iteration of the DevMan ransomware, first documented in July 2025. It enhances the capabilities of its predecessor with robust double-extortion tactics and operates under a Ransomware-as-a-Service (RaaS) model, offering structured leak and extortion infrastructure. Affiliates and operators are using it across diverse sectors—such as manufacturing, retail, and electronics—targeting organizations in Japan, Germany, and other countries. Demands from initial campaigns range widely, spanning from around $1 million to over $10 million USD.

parsing : enabled

Links

Page title Available Last visit URL Screen
DEVMAN 2.0 - Leaked Data
⬇️
2025-08-06
http://wugurgyscp5rxpihef5vl6b6m5ont3b6sezhl7boboso2enib2k3q6qd.onion/ Screen

Dharma

Description

Dharma is a prolific ransomware family active since at least 2016, evolving from the earlier CrySiS ransomware. It operates under a Ransomware-as-a-Service (RaaS) model, allowing affiliates to deploy customized builds with their own contact emails and extensions. Dharma typically appends encrypted files with patterns like .id-[victimID].[email].dharma or other campaign-specific suffixes. Initial access is often gained through exposed Remote Desktop Protocol (RDP) services secured with weak or stolen credentials, sometimes combined with brute-force attacks. The malware encrypts files using AES with RSA to secure the keys and drops ransom notes in text files and pop-up windows. Numerous variants have emerged over time, each linked to different affiliates, making attribution difficult.

Links

Page title Available Last visit URL Screen

Diavol

Description

Diavol is a ransomware strain first observed in June 2021, associated with the Wizard Spider threat group—best known for operating the TrickBot malware and the Conti ransomware. It uses a double-extortion model, encrypting victim files and exfiltrating sensitive data for additional leverage. The ransomware is written in C and employs a multi-threaded encryption routine using the ChaCha20 algorithm with RSA-2048 to secure encryption keys. Early variants appended no custom extension to files, relying instead on changing file headers, but later versions began appending extensions. Initial access vectors include exploitation of vulnerable systems and the use of TrickBot or BazarLoader infections as staging points. Victims are directed to a Tor-based negotiation portal through ransom notes.

Links

Page title Available Last visit URL Screen
Chat
⬇️
2022-10-31
https://7ypnbv3snejqmgce4kbewwvym4cm5j6lkzf2hra2hyhtsvwjaxwipkyd.onion Screen

Direwolf

Description

Dire Wolf is a recently emerged double-extortion ransomware group that first appeared around May 2025. It is a crypto-ransomware and data broker targeting industries like manufacturing and technology across multiple countries, including the U.S., Thailand, Taiwan, Singapore, Türkiye, among others. Written in Go and delivered as a UPX-packed binary, it utilizes robust encryption (Curve25519 and ChaCha20) to lock files with a .direwolf extension, while deleting backups, disabling logging, and terminating key services to block recovery. Victims receive highly customized ransom notes containing live-chat credentials and victim-specific portals, indicating a highly professional and targeted approach.

parsing : enabled

Links

Page title Available Last visit URL Screen
Dire Wolf
⬆️
2025-08-20
http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/ Screen
File Browser
⬆️
2025-08-20
http://direwolfgpyqohwxwoetsz7a6p72diu32c3wfysqdx4ei6bwft7zh3yd.onion/ Screen

Dispossessor

Description

Dispossessor, active since August 2023, was a data-extortion ransomware-as-a-service group led by the moniker "Brain". The group quickly expanded from U.S.-focused attacks to target small and mid-sized organizations globally—across sectors like healthcare, finance, transportation, education, and manufacturing. Their tactics included exploiting weak passwords and lack of multifactor authentication to gain access, followed by data exfiltration and staged extortion: victims were contacted via email or phone with links to proof-video platforms, and exposed on Tor-based leak sites if no payment was made. Many of the organizations targeted (approximately 43 identified) were across diverse countries including the U.S., Canada, Brazil, India, Germany, and more. By mid-2024, international law enforcement—including the FBI, UK National Crime Agency, and German agencies—successfully dismantled their infrastructure.

parsing : enabled

Links

Page title Available Last visit URL Screen
Dispossessor.com
⬇️
2024-08-12
http://e27z5kd2rjsern2gpgukhcioysqlfquxgf7rxpvcwepxl4lfc736piyd.onion Screen
⬇️
2025-01-27
http://cybertube.video/web/index.html#!/details?id=0c3b52f6e73709725dc6e12b30b139d9&serverId=2be5e68176ff4f8fbb930fe66321ab72 Screen
⬇️
2024-08-12
http://e27z5kd2rjsern2gpgukhcioysqlfquxgf7rxpvcwepxl4lfc736piyd.onion/back/getallblogs Screen
DNS resolution error | dispossessor.com | Cloudflare
⬇️
2025-06-26
http://dispossessor.com Screen
DNS resolution error | dispossessor-cloud.com | Cloudflare
⬇️
2025-06-26
http://dispossessor-cloud.com Screen
DNS resolution error | cybernewsint.com | Cloudflare
⬇️
2025-06-26
http://cybernewsint.com Screen
DNS resolution error | redhotcypher.com | Cloudflare
⬇️
2025-06-26
http://redhotcypher.com Screen

Donex

Description

Donex is a ransomware family that emerged in early 2022 as a rebrand of the older Muse ransomware. It uses a double-extortion strategy, combining file encryption with threats to leak stolen data on a Tor-hosted portal. Written in C++, Donex encrypts files using a combination of ChaCha20 and RSA-4096 algorithms and appends a custom extension unique to each victim. The group targets a broad range of sectors, including manufacturing, logistics, and professional services, with victims reported across North America, Europe, and Asia. Initial access methods include exploitation of public-facing applications and the use of stolen RDP credentials.

parsing : enabled

Links

Page title Available Last visit URL Screen
Donex ransomeware leakage -
⬇️
2024-04-02
http://g3h3klsev3eiofxhykmtenmdpi67wzmaixredk5pjuttbx7okcfkftqd.onion Screen

Donutleaks

Description

Donut Leaks, first reported in August 2022, is a data-extortion group linked to high-profile breaches, including the compromise of Continental in 2022. The group does not consistently encrypt files—in some cases acting purely as a data broker—yet adopts a double-extortion model when ransomware is deployed. Their operations involve exfiltrating sensitive corporate data, then threatening public release via a dedicated leak site on Tor. Donut Leaks has targeted organizations in automotive manufacturing, IT services, and professional sectors, with confirmed victims in Europe and North America. Intrusion methods are not fully documented in public sources but likely include phishing, credential theft, and exploitation of exposed services.

parsing : enabled

Links

Page title Available Last visit URL Screen
D0N#T__::LEAKS::
⬇️
2022-10-26
https://sbc2zv2qnz5vubwtx3aobfpkeao6l4igjegm3xx7tk5suqhjkp5jxtqd.onion/ Screen
Login - _d0nut.::Files_
⬇️
2022-10-26
https://doq32rjiuomfghm5a4lyf3lwwakt2774tkv4ppsos6ueo5mhx7662gid.onion Screen
⬇️
2025-01-21
http://sbc2zv2qnz5vubwtx3aobfpkeao6l4igjegm3xx7tk5suqhjkp5jxtqd.onion/ Screen
404 Not Found
⬇️
2024-12-29
http://dk4mkfzqai6ure62oukzgtypedmwlfq57yj2fube7j5wsoi6tuia7nyd.onion/index.php? Screen
⬇️
Never
http://qkbbaxiuqqcqb5nox4np4qjcniy2q6m7yeluvj7n5i5dn7pgpcwxwfid.onion/
⬇️
Never
http://ieflygyfoezms2wshjpfyfz4hpyxjcdtxejntysvopd7n7cmmnucbkad.onion
⬇️
Never
http://5zhg2foerm66oqdpmhs52pzfkwqx5rcfhje5j5rltctq5cjs653u3rid.onion

Doppelpaymer

Description

DoppelPaymer is a ransomware family first identified in mid-2019, derived from the BitPaymer codebase and operated by the Evil Corp cybercrime group. It is known for its double-extortion approach, encrypting victim files with AES-256 and securing keys with RSA-2048, while also stealing sensitive data for public release if payment is not made. DoppelPaymer primarily targets large organizations, including those in healthcare, government, and manufacturing, with high ransom demands often in the millions of U.S. dollars. Infection vectors include phishing emails carrying Dridex or other loaders, exploitation of remote access services, and credential theft. Encrypted files typically retain their original name with a new extension, and ransom notes direct victims to Tor-based portals for negotiation. The group has been linked to attacks on institutions such as the City of Torrance, the State of Delaware, and hospital systems in Germany and the United States.

Links

Page title Available Last visit URL Screen
Start-maximized.com
⬇️
2022-02-24
http://hpoo4dosa3x4ognfxpqcrjwnsigvslm7kv6hvmhh2yqczaxy3j6qnwad.onion/
⬇️
Never
http://qkbbaxiuqqcqb5nox4np4qjcniy2q6m7yeluvj7n5i5dn7pgpcwxwfid.onion/

Dragonforce

Description

DragonForce is a ransomware-as-a-service (RaaS) group first identified in late 2023. Originally linked to hacktivist activity, the group pivoted to financially motivated operations by early 2024. Since then, it has accelerated into a highly organized cartel-like network, providing customizable payloads to affiliates, a sophisticated affiliate portal, and shared infrastructure for leak sites and campaigns. The group has targeted a wide range of sectors globally, including major UK retailers such as M&S, Harrods, and Co-op, along with organizations in government, logistics, and manufacturing. Its operations are known for strategic branding flexibility, enabling affiliates to operate under their own labels using DragonForce’s backend services.

parsing : enabled

Links

Page title Available Last visit URL Screen
DragonForce | Blog
⬆️
2025-08-20
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog Screen
DragonForce | Recovery
⬆️
2025-08-20
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion/login Screen
DragonForce | Leaks
⬆️
2025-08-20
http://dragonforxxbp3awc7mzs5dkswrua3znqyx5roefmi4smjrsdi22xwqd.onion Screen
⬇️
Never
http://zsglo7t7osxyk3vcl7zxzup7hs4ir52sntteymmw63zvoxzcqytlw7qd.onion/
⬇️
Never
http://6dgi54prfmpuuolutr4hl3akasxbx4o34g5y2bj4blrvzzkjemhxenad.onion/
⬇️
Never
http://eogeko3sdn66gb7vjpwpmlmmmzfx7umtwaugpf5l6tb5jveolfydnuad.onion/
⬇️
Never
http://ewrxgpvv7wsrqq7itfwg5jr7lkc6zzknndmru5su2ugrowxo3wwy5yad.onion/
⬇️
Never
http://3ro23rujyigqrlrwk3e4keh3a3i6ntgrm3f42tbiqtf7vke47c6a6ayd.onion/
⬇️
Never
http://jziu7k7uee467r2wt66ndrwymmw7tsmqgcqi7aemcaxraqmaf2hdm3yd.onion/
⬇️
Never
http://2yczff6zyiey3gkgl5anwejktdp73abxbzbnvwobmrwkwgf3hudpyvyd.onion/
⬇️
Never
http://bpoowhokr3vi32l3t4mjdtdxfrfpigwachopk5ojwmgxihnojhsawuyd.onion/
⬇️
Never
http://dbvczza7nhwdb5kdvkzjtkrcvwnrt5viw7mihutueprvajy7rxhwq6id.onion/
⬇️
Never
http://xtcwd3xmxpggtizn7kmwwqeizexflkkyqsytg2kauccau6ddsfa4gfyd.onion/
⬇️
Never
http://4wcrfql53ljekid3sn66z6swjot725muveddq77utxltaelw64eikfid.onion/
⬇️
Never
http://73h3lxn24kuayyfkn4t6ij7e67jklo24vqzqdhpts3ygmim7hu6u6aid.onion/
⬇️
Never
http://nwtetzmrqhxieetg5lvth7szzvg35gfrqt23ly46vku56oo7pkueswyd.onion/
⬇️
2025-04-27
http://dszmdx3jr7vggdaf2c5k4qunt4mxclelhgbtjlgewlkmlnfpsnsg3sad.onion/ Screen
⬆️
2025-08-20
http://fsguestuctexqqaoxuahuydfa6ovxuhtng66pgyr5gqcrsi7qgchpkad.onion/ Screen

Dunghill

Description

Dunghill Leak is the publicly branded data leak site (DLS) operated by the Dark Angels ransomware group, established circa January 2023. Rather than a standalone encryption threat, it serves as the disclosure and extortion platform where stolen victim data is published if ransom demands are ignored. Dark Angels is known for highly targeted “big game hunting” tactics, exfiltrating tens to hundreds of terabytes of corporate data, often without encrypting systems. Victims include major industry players—like Johnson Controls, Sabre, Sysco, and a Fortune 50 firm—which reportedly paid a record-breaking $75 million USD ransom. The leak site is complemented by a mirrored Telegram channel for distributing victim announcements and maintaining negotiation traffic.

parsing : enabled

Links

Page title Available Last visit URL Screen
Dunghill Leak - Details
⬇️
2024-07-23
http://p66slxmtum2ox4jpayco6ai3qfehd5urgrs4oximjzklxcol264driqd.onion/index.html Screen
Dunghill Leak - Details
⬇️
2025-07-21
http://nsalewdnfclsowcal6kn5csm4ryqmfpijznxwictukhrgvz2vbmjjjyd.onion/ Screen
Home
⬆️
2025-08-20
https://5kvv27efetbcqgem4tl7jsolvr3jxkrbmn23rcjzl7kvqycxuao3t4ad.onion/ Screen
⬇️
Never
http://p242scyqdujesnozehk4ecfshk6i357cjywv3vzywrera3bndko4pgyd.onion
⬇️
Never
http://r4znrcbthzjclilled5yyrjy35gagoyfwvekiqih7btzrchvqdmgviqd.onion
⬇️
Never
http://sldltcn2d6mgtp66vgmvjptdtwgqyyewsjgwkzjybq3x55plzw4tefid.onion:3452
⬇️
2025-03-31
http://zroxb37ghsh2xkwrkfkyz65jmuv6goaltcqxohk4syziahgjv5zou5qd.onion Screen

Ech0Raix

Description

The QNAPCrypt ransomware works similarly to other ransomware, including encrypting all files and delivering a ransom note. However, there are several important differences: 1. The ransom note was included solely as a text file, without any message on the screen—naturally, because it is a server and not an endpoint. 2. Every victim is provided with a different, unique Bitcoin wallet—this could help the attackers avoid being traced. 3. Once a victim is compromised, the malware requests a wallet address and a public RSA key from the command and control server (C&C) before file encryption.

Links

Page title Available Last visit URL Screen
⬇️
2023-09-06
http://veqlxhq7ub5qze3qy56zx2cig2e6tzsgxdspkubwbayqije6oatma6id.onion Screen
⬇️
2025-07-02
http://7zvu7njrx7q734kvk435ntuf37gfll2pu46fmrfoweczwpk2rhp444yd.onion Screen

Egregor

Description

Egregor is a ransomware strain that appeared in September 2020, widely believed to be a rebrand or successor to the Maze ransomware operation, using similar infrastructure and tactics. It runs as a Ransomware-as-a-Service (RaaS), recruiting affiliates to deploy its payload in exchange for a percentage of ransom payments. Egregor employs a double-extortion model, encrypting files with ChaCha and RSA-2048 algorithms, while exfiltrating sensitive data to threaten public release. Victims receive ransom notes directing them to Tor-based portals for negotiation. The group has targeted organizations worldwide across sectors such as retail, transportation, manufacturing, and finance, with notable attacks on Barnes & Noble and Cencosud. Egregor's operations were disrupted in early 2021 through coordinated law enforcement action, leading to the arrest of suspected affiliates in Ukraine.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://egregoranrmzapcv.onion/
Welcome page
⬆️
2025-08-20
http://egregornews.com Screen

El Dorado

Description

This group is believed to be connected to Lost Trust. El Dorado rebranded to BlackLock in September 2024. User "$$$" on RAMP is known to be connected to the group.

parsing : enabled

Links

Page title Available Last visit URL Screen
DragonForce | Oops...
⬇️
2025-03-28
http://dataleakypypu7uwblm5kttv726l3iripago6p336xjnbstkjwrlnlid.onion/ Screen
⬆️
2025-08-20
http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion Screen
⬆️
2025-08-20
http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion/Url=4094dd92-0f91-4699-8328-fdb7070a8230 Screen
⬇️
2025-02-16
http://panela3eefdzfzxzxcshfnbustdprtlhlbe3x2fqomdz7t33iqtzvjyd.onion/ Screen
None
⬇️
Never
http://26ubgm3vvrjawkdyfhvl2d2nhq77nu3zsagbih4yy2zgau5uv5ivfgyd.onion
BlackLock
⬆️
2025-08-20
http://zdkexsh2e7yihw5uhg5hpsgq3dois2m5je7lzfagij2y6iw5ptl35gyd.onion/ Screen
None
⬇️
Never
http://4ozbomcjurd64vgeblkoqeqirvawi3dddswriw6qespscmequmqlshyd.onion/

Elcometa

Links

Page title Available Last visit URL Screen

Elonmusknow

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://leaksbcwijsbkxcx76s24qi4ab4jn7rgtzzyiss7fzco6amhj6h365ad.onion/

Elpaco

Description

Elpaco is a variant of Mimic ransomware that emerged around August 2023. Designed with significant customization and stealth in mind, it targets Windows systems by abusing the Everything search utility to optimize file discovery and accelerate encryption. Operators exploit various initial access methods—most notably RDP brute-force and the Zerologon vulnerability (CVE-2020-1472)—to gain access, escalate privileges, and deliver the payload. The ransomware uses a 7z SFX dropper, deploys multi-threaded encryption, disables recovery options, and self-deletes after execution, leaving victims with encrypted files bearing Elpaco-specific extensions. It's recognized for its adaptability and advanced features compared to earlier Mimic variants.

Links

Page title Available Last visit URL Screen

Embargo

Description

Embargo is a Ransomware-as-a-Service (RaaS) operation first observed in May 2024. It employs a double-extortion model, encrypting victim data while exfiltrating sensitive files for publication on a Tor-based leak site. Embargo uses a Rust-based payload that leverages AES-256 and RSA-4096 encryption, deletes volume shadow copies, and disables recovery features to prevent restoration. Its targeting appears opportunistic but has included sectors such as finance, manufacturing, and professional services across North America, Europe, and Asia. The ransomware’s customization options, negotiation portal, and leak infrastructure suggest a closed affiliate model with a focus on operational security.

parsing : enabled

Links

Page title Available Last visit URL Screen
EMBARGO
⬆️
2025-08-20
http://embargobe3n5okxyzqphpmk3moinoap2snz5k6765mvtkk7hhi544jid.onion/ Screen
EMBARGO
⬇️
2024-06-29
http://5ntlvn7lmkezscee2vhatjaigkcu2rzj3bwhqaz32snmqc4jha3gcjad.onion/ Screen
⬇️
Never
http://76yl7gfmz2kkjglcevxps4tleyeqnqhfcxh6rnstxj27oxhoxird3hyd.onion
Index of /
⬇️
2025-08-03
http://yj3eozlkkxkcsprc2fug7tolgtnllruyavuyyar3yzsccjdgvu2bl2yd.onion/ Screen
Index of /
⬇️
2025-08-03
http://ufjoe7fdwvml52oin7flwlqksvp3fcvfyh2kwsngt7j2yf7xou52w2qd.onion/ Screen
Index of /
⬇️
2025-08-03
http://i2okedfryhllg6ka6aur3wnxcxdaufbuuysp4drr5xoc6gvqpcogejid.onion/ Screen
Index of /
⬇️
2025-08-03
http://s37weqmxusvfcxkoorgkut5v7frn27zftdb6pdjsyjl5djg6oxjqjbid.onion/ Screen
Index of /
⬇️
2025-08-03
http://oftm4u5cfl6wyadj27h3csdxfvyd7favssxcr7l7wnswdsrfedxswxqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://wg55rcy2chmbpeh6pl5pftnveac2lqfxbletrtzanfjhhmvcjnn5tcqd.onion/ Screen
Index of /
⬇️
2025-08-03
http://sbjthwyoxfuxq75b77e2hsj7ie67m3qicfnuikhuabwo3sikvrzyaxad.onion/ Screen
Index of /
⬇️
2025-08-03
http://zo5xog4vpvdae473doneepetidh36m5czdq2vyeiq3lvqhuel56p6nid.onion/ Screen
Index of /
⬇️
2025-08-03
http://66ohzao6afsv2opk22r2kv6fbnf2fthe7v4ykzzc5vjezvvyf3gocwyd.onion/ Screen
Apache2 Debian Default Page: It works
⬇️
2025-04-03
https://2nn4b6gihz5bttzabjegune3blwktad2zmy77fwutvvrxxodbufo6qid.onion/ Screen
Index of /
⬆️
2025-08-20
http://y6kyfs2unbfcyodzjrxadn4w5vyulhyotdi5dtiqulxbduujehupunqd.onion/ Screen
⬆️
2025-08-20
http://embargobe3n5okxyzqphpmk3moinoap2snz5k6765mvtkk7hhi544jid.onion/api/blog/get Screen
Index of /
⬇️
2025-08-03
http://3o5ewrzhqoyodfs5kll4cjxagdfrpuu474panwobm4im7ejfpaux5jyd.onion/ Screen
⬆️
2025-08-20
http://4q5tsu5o3msmv4am4dfhupwhzlyg7wv3lpswbvbhcrknr4ega7xetxad.onion/ Screen
Index of /
⬆️
2025-08-20
http://z2b75lk7xf6kme3zfvlmdmpwiaansnkcuhsojd23dgub5md24fhogcyd.onion/ Screen
Index of /
⬇️
2025-04-03
http://7lxwbzlkpjyuahuvngwwkc4mycj2a4flh45ksqjo2ezfdbkmxmlxikad.onion/ Screen
Index of /
⬇️
2025-08-03
http://7watkqnnuwxvlpgy5gaosgqy67nve3jgpy37xobqngmswz3vuvde56yd.onion/ Screen
Index of /
⬇️
2025-07-12
http://5dw7bszmidrhpoltqbqmpixpz6mvgez3mr6xc7ktval2glrmbxkwopad.onion/ Screen
EMBARGO
⬇️
2025-08-19
http://a3kvb22nuhfgaluy6uzufrjn3azzsu7tylszdbyne3kiextdmxz4nnyd.onion/ Screen
Index of /
⬇️
2025-07-12
http://ec6edgevw2lzqy4ipafpbvjuu7r6ugqbljqokl3pvecc6c3a5ix3wgyd.onion/ Screen
Index of /
⬇️
2025-06-19
http://qrthxx5hkttfl3pk57eou6ddqi34pxsibxvndq7vt5pblqbaurkmxbqd.onion/ Screen
Index of /
⬇️
2025-06-19
http://usu2gxoiijvnswhfymd6ucjjwhtgqby4c4ywzvnrtw4i6mpgppvzpsad.onion/ Screen
Index of /
⬇️
2025-07-12
http://qk5nd25xdnygqrey7al2tb3xop5brk7kxua7xr2zrgftzked43bku4yd.onion/ Screen
Index of /
⬇️
2025-07-12
http://p474ku5ehoex7mfsbdenppakbb4twvrnvggjzhp53xw4z5qq6glm4yad.onion/ Screen
Index of /
⬇️
2025-08-06
http://vh2wkazjlflm6pvwtvw2fnztu3dcw4346lasvikzeg25yhx6bjvl5pqd.onion/ Screen
⬇️
Never
http://rngjexyyyl5mek5kg2lkxilqfef5nr6bpa4u24i5ei5hb3ydsh5drpid.onion/
⬇️
Never
http://tamvd5fdyvpekhaf2sdg5sum73ra2abc4h2iqihijpvw4hythnlmuhid.onion/
Index of /
⬇️
2025-08-06
http://jolfnfw6lmcjsppgjfimhimqt2t7viybk67yc5zkxip6fxrcgo7mv4id.onion/ Screen

Enciphered

Description

aka xoriste

Links

Page title Available Last visit URL Screen

Encrypthub

Links

Page title Available Last visit URL Screen

Endurance

Description

Endurance is a destructive ransomware variant first observed in 2023, developed and operated by the threat actor known as IntelBroker (also referred to as Butler Spider). Rather than encrypting files for decryption, it functions primarily as a data wiper, overwriting file contents, appending randomized filenames, and then deleting the files altogether. The source code for the malware was intentionally made public by the operator, indicating its use as both a tool and a statement. Endurance was used in high-profile breaches, including targeting government agencies, large enterprises, and telecommunications providers.

Links

Page title Available Last visit URL Screen
Endurance
⬇️
2023-06-01
http://h44jyyfomcbnnw5dha7zgwgkvpzbzbdyx2onu4fxaa5smxrgbjgq7had.onion/ Screen

Entropy

Description

Entropy is a ransomware first seen in 1st quarter of 2022, is being used in conjunction of Dridex infection. The ransomware uses a custom packer to pack itself which has been seen in some early dridex samples.

Links

Page title Available Last visit URL Screen
Entropy hall of fall
⬇️
2022-02-27
http://leaksv7sroztl377bbohzl42i3ddlfsxopcb6355zc7olzigedm5agad.onion/posts

Ep918

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://dg5fyig37abmivryrxlordrczn6d6r5wzcfe2msuo5mbbu2exnu46fid.onion

Eraleign (Apt73)

Description

Rebrand to Bashe in October 2024. Eraliegn, self-styled as APT73 and formerly known as Bashe, surfaced in April 2024. Rather than conducting real ransomware campaigns, the group specializes in fabricating data breach narratives, curating or reusing existing leaked data (often from years-old breaches) and presenting it on a Tor-hosted leak site to project credibility. They claim to have breached organizations across sectors—such as banking, travel, manufacturing, and IT—targeting entities in countries including the United Kingdom, India, Indonesia, France, and Canada. However, threat analysis shows these claims are deceptive in nature rather than demonstrative of technical prowess or active network compromise.

parsing : enabled

Links

Page title Available Last visit URL Screen
Access Blocked
⬇️
2024-06-22
http://eraleignews.com/ Screen
APT73
⬇️
2024-08-29
http://wn6vonooq6fggjdgyocp7bioykmfjket7sbp47cwhgubvowwd7ws5pyd.onion/ Screen
BASHE
⬇️
2025-08-08
http://basheqtvzqwz4vp6ks5lm2ocq7i6tozqgf6vjcasj4ezmsy4bkpshhyd.onion/ Screen
⬇️
2025-08-08
http://bashe4aec32kr6zbifwd5x6xgjsmhg4tbowrbx4pneqhc5mqooyifpid.onion/ Screen
BASHE
⬇️
2025-08-08
http://basherq53eniermxovo3bkduw5qqq5bkqcml3qictfmamgvmzovykyqd.onion Screen
BASHE
⬇️
2025-08-08
http://basherykagbxoaiaxkgqhmhd5gbmedwb3di4ig3ouovziagosv4n77qd.onion Screen
BASHE
⬇️
2025-08-08
http://bashete63b3gcijfofpw6fmn3rwnmyi5aclp55n6awcfbexivexbhyad.onion Screen
BASHE
⬇️
2025-08-08
http://bashex7mokreyoxl6wlswxl4foi7okgs7or7aergnuiockuoq35yt3ad.onion Screen
⬇️
Never
http://7bbqrijcds5sgji3kiwo5o5qgxfgoyufykhzfdo6xl3qbdes2e7tdyad.onion
⬇️
2025-08-08
http://bashe4aec32kr6zbifwd5x6xgjsmhg4tbowrbx4pneqhc5mqooyifpid.onion Screen
⬇️
2025-08-08
http://bashed52orwi7qoyvmcfkdnuaogta4inpojfd6cthzkp4qpsq64ux4ad.onion Screen
⬇️
2025-08-08
http://bashedl53memptddxzb4kr5mnkzse4fmhpqeq7jb4srndswar46nofid.onion Screen
⬇️
2025-08-08
http://bashefe5uezp2jtxpk24b2pyfnnfyguicgrgqufgu57mfluegotbeayd.onion Screen
⬇️
2025-08-08
http://bashei5oy4zvmf2letnupwhgprdkjyssm3zxj2oyr6wfezkf3elehzqd.onion Screen
⬇️
Never
http://qku4reiyfcs2vqq5tow2uprhyqhweo56lrgs6457svr3ej4ton5frkad.onion

Eruption

Description

Rebranded to Sabbath.

Links

Page title Available Last visit URL Screen

Everest

Description

Everest is a ransomware group active since at least December 2020, known for its double-extortion tactics. The group initially operated as a typical ransomware outfit, encrypting files with strong cryptography and appending victim-specific extensions, but later shifted toward pure data extortion—threatening to sell or release stolen data without necessarily deploying encryption. Everest targets a wide range of sectors, including government, healthcare, manufacturing, and IT services, with confirmed victims in North America, Europe, and Asia. Initial access vectors include exploitation of vulnerable public-facing applications, phishing campaigns, and credential theft for remote access services. The group maintains a Tor-based leak site to publish stolen information and advertise access to compromised networks.

parsing : enabled

Links

Page title Available Last visit URL Screen
⬆️
2025-08-20
http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/ Screen
Everest Group
⬇️
2025-01-20
http://ransomoefralti2zh5nrv7iqybp3d5b4a2eeecz5yjosp7ggbepj7iyd.onion Screen
Index of /
⬇️
2025-03-25
http://2vqamwfdpis5rkjtpkutigykp56n6hkxfurm6qukdxp6uz5uff5kkaid.onion/ Screen
404 Not Found
⬇️
2025-02-02
http://bifpwatchoxp7tsb2kpes37b23ogjrb2kj4wgr7yncf4hhgsfahu7jad.onion/ Screen
Index of /
⬇️
2025-03-25
http://aihvh6j6fbkfjyc6jqbsh2ed4s3rym2v2pu6kd3z3exdso2xc2qwcuqd.onion/ Screen

Exorcist

Description

Ransomware.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://7iulpt5i6whht6zo2r52f7vptxtjxs3vfcdxxazllikrtqpupn4epnqd.onion

Fakersa

Links

Page title Available Last visit URL Screen

Farattack

Links

Page title Available Last visit URL Screen

Fargo

Description

Fargo is a ransomware variant that surfaced in 2022, primarily targeting Microsoft SQL Server (MSSQL) systems. Believed to be a variant of the TargetCompany ransomware family, Fargo uses brute-force or credential-stuffing attacks on exposed MSSQL instances to gain access, then executes payloads via SQL Server commands. Once deployed, it encrypts files using a combination of symmetric and asymmetric algorithms, appends the .Fargo3 (or similar) extension, and drops a ransom note directing victims to contact operators via email. It also attempts to delete system backups and shadow copies to prevent recovery. Fargo has been observed targeting organizations in multiple sectors, with a concentration of victims in South Korea and other parts of Asia.

Links

Page title Available Last visit URL Screen

Faust

Description

Faust is a variant of the well-known Phobos ransomware, part of a Ransomware-as-a-Service (RaaS) ecosystem active since around May 2019. Faust employs a double-extortion model, encrypting victim files and threatening to release stolen data if ransom demands are not met. It's distributed via Office document payloads using VBA scripts and known for its fileless attack delivery, enabling stealth and evasion.

Links

Page title Available Last visit URL Screen

Fivehands

Description

FiveHands is a ransomware family first observed in January 2021, believed to be a successor to the HelloKitty ransomware variant. It operates under a Ransomware-as-a-Service (RaaS) model and uses the double-extortion tactic, encrypting files while threatening to leak stolen data via a Tor-based site. FiveHands is written in C# and leverages the NTRUEncrypt algorithm for file encryption alongside Curve25519 for key exchange. The ransomware is commonly deployed via Malwarebytes SombRAT or Cobalt Strike beacons after initial compromise, often gained through exploitation of vulnerable VPNs, phishing, or compromised credentials. FiveHands has targeted organizations in healthcare, finance, and manufacturing across North America, Europe, and Asia.

Links

Page title Available Last visit URL Screen

Fog

Description

Fog is a sophisticated ransomware strain first observed in April–May 2024, initially targeting U.S. educational institutions before expanding into sectors such as government, business services, finance, and manufacturing. The group conducts fast, double-extortion attacks: they exploit compromised VPN credentials or known vulnerabilities, deploy encryption (notably using extensions like .fog, .FLOCKED), and exfiltrate data prior to encryption to maximize victim pressure. Fog is associated with other prolific actors—such as Akira and Conti—through shared tooling, infrastructure timelines, and even cryptocurrency wallets.

parsing : enabled

Links

Page title Available Last visit URL Screen
500 Internal Server Error
⬇️
2025-06-05
https://xql562evsy7njcsngacphc2erzjfecwotdkobn3m4uxu2gtqh26newid.onion/ Screen
Blog
⬇️
2025-04-20
http://xbkv2qey6u3gd3qxcojynrt4h5sgrhkar6whuo74wo63hijnn677jnyd.onion Screen
Blog
⬇️
2025-04-20
http://xbkv2qey6u3gd3qxcojynrt4h5sgrhkar6whuo74wo63hijnn677jnyd.onion/posts Screen
404: This page could not be found.
⬇️
2025-04-20
http://hlbqbuy2bo3onn6h6eq7pbci24kughiaw4rkxrewidnqma3hwwgt2ead.onion Screen
/
⬇️
2025-05-07
http://44dz7r5uduhihaks7m62vztthp5s7thokbgeida7usm4rvakriuvk3yd.onion/ Screen
Google
⬇️
2025-05-07
http://nw5zrjqarckmsf22rrgo5yooelpnn5raxhesuhrpzceqibmjwanbbaad.onion/ Screen

Frag

Description

Frag is a relatively new ransomware and data extortion group first seen in February 2025. The group operates a dedicated Tor-based leak site where it publishes victim details, including sector, location, and sample stolen files, as part of its double-extortion strategy. Within its first month of activity, Frag claimed over two dozen victims, spanning industries such as manufacturing, aviation, real estate, retail, and legal services, with a global footprint including the United States, the Netherlands, and Singapore. Intrusion methods have included exploitation of known vulnerabilities—such as the Veeam Backup & Replication flaw CVE-2024-40711—and compromised remote access appliances. The group’s operations and targeting style suggest experienced actors, possibly with past involvement in other ransomware projects.

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
Never
http://xhvzsaxl3vbio6dg547envq5xgap3pwobtursdvwatdoxextv43kb7id.onion
Frag Blog
⬆️
2025-08-20
http://34o4m3f26ucyeddzpf53bksy76wd737nf2fytslovwd3viac3by5chad.onion/ Screen
Frag Blog
⬆️
2025-08-20
http://34o4m3f26ucyeddzpf53bksy76wd737nf2fytslovwd3viac3by5chad.onion/leaks/ Screen
⬇️
2025-07-22
http://34o4m3f26ucyeddzpf53bksy76wd737nf2fytslovwd3viac3by5chad.onion/tada/posts/leaks?page=1 Screen

Freecivilian

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Free Civilian
⬇️
2023-06-01
http://gcbejm2rcjftouqbxuhimj5oroouqcuxb2my4raxqa7efkz5bd5464id.onion/ Screen

Freeworld

Description

FreeWorld is a ransomware variant first observed in September 2023, and is believed to be derived from the Mimic ransomware family. It is deployed through coordinated campaigns dubbed DB#JAMMER, which exploit poorly secured Microsoft SQL (MSSQL) servers exposed to the internet. Attackers gain initial access via brute force, leverage the xp_cmdshell feature to execute shell commands, disable defenses, deploy remote access tools like Cobalt Strike and AnyDesk, and eventually deliver the FreeWorld payload. The ransomware encrypts files using hybrid encryption and appends the .FreeWorldEncryption extension. Victims receive a ransom note titled FreeWorld-Contact.txt, directing them on payment and data recovery steps.

Links

Page title Available Last visit URL Screen

Frozen

Links

Page title Available Last visit URL Screen

Fsociety

Description

This group is also known by their malware name, FLOCKER. FSociety is a modern Ransomware-as-a-Service (RaaS) operation that emerged around 2024, named after the fictional hacking collective from Mr. Robot. It runs a double-extortion setup—encrypting victims’ data while simultaneously threatening to leak stolen files via a Tor-hosted portal. Organized campaigns suggest collaborative operations with other cybercrime actors, marking it as a part of a growing ransomware cartel ecosystem.

parsing : enabled

Links

Page title Available Last visit URL Screen
𝐅𝐒𝐎𝐂𝐈𝐄𝐓𝐘 | 𝐅𝐋𝐎𝐂𝐊𝐄𝐑
⬇️
2025-08-18
http://flock4cvoeqm4c62gyohvmncx6ck2e7ugvyqgyxqtrumklhd5ptwzpqd.onion/ Screen

Fsteam

Links

Page title Available Last visit URL Screen
Home
⬇️
2024-07-12
http://hkk62og3s2tce2gipcdxg3m27z4b62mrmml6ugctzdxs25o26q3a4mid.onion/ Screen

Ftcode

Description

FTCode is a ransomware family first observed in 2013 as a PowerShell-based threat and later resurfaced in September 2019 with enhanced capabilities. It is notable for being fileless, executing entirely in memory using PowerShell scripts, which allows it to evade traditional antivirus detection. FTCode is commonly delivered via malicious email campaigns, often using phishing attachments such as Word documents with embedded macros that execute the ransomware script. It encrypts files using the AES algorithm and appends the .FTCODE extension, leaving ransom notes instructing victims to contact the operators via email. Later variants added capabilities such as stealing credentials from browsers and email clients. FTCode campaigns have been observed globally, with a focus on Europe, particularly Italy.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://qvo5sd7p5yazwbrgioky7rdu4vslxrcaeruhjr7ztn3t2pihp56ewlqd.onion/

Funksec

Description

Funksec, a double extortion ransomware group, emerged in late 2024 and quickly gained notoriety by breaching databases and selling access to 15 government websites within just a month. Claiming to be entirely self-taught and operating without collaboration from other groups, Funksec is a four-member team driven primarily by financial motives. The group leverages AI for specific tasks, such as creating tools and phishing templates, though they emphasize that AI contributes to only about 20% of their operations. Notably, they have developed their own proprietary AI tool, WormGPT, a desktop application built entirely in-house. To enhance their phishing campaigns, Funksec uses premium services like PhishingBox to create customized phishing templates, adding another layer of precision and sophistication to their methods. After the interview, during some casual chit-chat, it came to light that the owner of Funksec was also behind an underground forum called DarkZone, which had been built in collaboration with GhostSec in the past. https://osint10x.com/threat-actor-interview-spotlighting-on-funksec-ransomware-group/

parsing : enabled

Links

Page title Available Last visit URL Screen
Funksec
⬇️
2024-12-30
http://7ixfdvqb4eaju5lzj4gg76kwlrxg4ugqpuog5oqkkmgfyn33h527oyyd.onion/ Screen
Funksec
⬇️
2024-12-28
http://pke2vht5jdeninupk7i2thcfvxegsue6oraswpka35breuj7xxz2erid.onion/ Screen
Funksec
⬇️
2024-12-06
http://ykqjcrptcai76ru5u7jhvspkeizfsvpgovton4jmreawj4zdwe4qnlid.onion/ Screen
New Address Blog
⬆️
2025-08-20
http://funknqn44slwmgwgnewne6bintbooauwkaupik4yrlgtycew3ergraid.onion/ Screen
New Address Blog
⬆️
2025-08-20
http://funkxxkovrk7ctnggbjnthdajav4ggex53k6m2x3esjwlxrkb3qiztid.onion/ Screen
New Address Blog
⬇️
2025-08-20
http://funkiydk7c6j3vvck5zk2giml2u746fa5irwalw2kjem6tvofji7rwid.onion/ Screen
Funkforum
⬇️
2025-03-20
http://funk4ph7igelwpgadmus4n4moyhh22cib723hllneen7g2qkklml4sqd.onion/ Screen
Marketplace - Home Page
⬇️
2025-01-29
http://funkyiazgfsrxrib6rnxbhkgfqi7isisfbqnwk2ycf7tpgfhtevlamad.onion/ Screen
Anon Hosting - Hidden Services
⬇️
2025-06-05
http://funksec.top/ Screen
Funksec v3.0
⬇️
2025-04-13
http://funksec53xh7j5t6ysgwnaidj5vkh3aqajanplix533kwxdz3qrwugid.onion/ Screen
Funksec v3.0
⬇️
2025-04-13
http://funksecsekgasgjqlzzkmcnutrrrafavpszijoilbd6z3dkbzvqu43id.onion/ Screen
Funksec v3.0
⬇️
2025-04-13
http://funksec7vgdojepkipvhfpul3bvsxzyxn66ogp7q4pptvujxtpyjttad.onion/ Screen
Contact Form - FunkLocker Support
⬇️
2025-03-20
http://funk45xqgrkrtej4743evcgv65oi3w4shwvjx3cvrdtqwul7gzkxuxqd.onion/ Screen

Fusion

Links

Page title Available Last visit URL Screen

Gandcrab

Description

GandCrab was a prolific Ransomware-as-a-Service (RaaS) operation active from January 2018 to mid-2019. It quickly became one of the most widespread ransomware families due to its affiliate-based distribution model, where operators provided the ransomware to partners in exchange for a revenue share (reportedly 30–40%). GandCrab used a double-extortion approach in later stages, encrypting files with a combination of Salsa20 and RSA-2048 algorithms and appending extensions that varied by version (e.g., .GDCB, .KRAB, .CRAB). Initial access vectors included phishing emails with malicious attachments, exploit kits (notably RIG and GrandSoft), and remote desktop protocol (RDP) attacks. GandCrab’s operators claimed to have earned over $150 million before publicly announcing their retirement in June 2019, after which decryption keys for all versions were released.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://gandcrabmfe6mnef.onion/

Gangbang

Links

Page title Available Last visit URL Screen

Gazprom

Links

Page title Available Last visit URL Screen

Gd Lockersec

Description

Our team members are from different countries and we are not interested in anything else, we are only interested in dollars. We do not allow CIS, Cuba, North Korea and China to be targeted. Re-attacks are not allowed for target companies that have already made payments. We do not allow non-profit hospitals and some non-profit organizations be targeted.

parsing : enabled

Links

Page title Available Last visit URL Screen
GD LockerSec | Home
⬇️
2025-01-27
http://igziys7pres4644kbrtakxfbrwkyld64nxk5prpkgtcexwrrjgtfjzyd.onion Screen

Ghost

Description

aka Cring / Ghost (Cring) Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses. Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe. https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a

Links

Page title Available Last visit URL Screen

Global

Description

Now a RaaS by BlackLock ($$$). Global Group is a newly emerged Ransomware-as-a-Service (RaaS) platform that debuted in June 2025 on the Ramp4u cybercrime forum. Marketed as a successor to the Mamona and BlackLock ransomware families, it leverages a Golang-based, cross-platform payload that supports execution on Windows, macOS, and Linux. This group stands out by incorporating AI-driven chatbots to manage victim negotiations, promoting scalability and efficiency—even for affiliates lacking language skills. Within its first weeks of operation, Global Group claimed numerous victims across industries such as healthcare, automotive services, and facilities management, located in the U.S., U.K., Australia, and Brazil.

parsing : enabled

Links

Page title Available Last visit URL Screen
GLOBAL | Blog
⬆️
2025-08-20
http://vg6xwkmfyirv3l6qtqus7jykcuvgx6imegb73hqny2avxccnmqt5m2id.onion/ Screen
⬆️
2025-08-20
http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion/ Screen
GLOBAL | Client Portal
⬆️
2025-08-20
http://gdbkvfe6g3whrzkdlbytksygk45zwgmnzh5i2xmqyo3mrpipysjagqyd.onion/ Screen
GLOBAL | FileShare
⬆️
2025-08-20
http://7bmz2tc4p2jk23dcyehg37cd7veflk3fyhxrnbxz75vvno2azfy6qayd.onion/ Screen

Globe

Description

Globe is a ransomware family that first appeared in August 2016, notable for its highly customizable codebase that allows operators to configure ransom note text, encryption algorithms, and file extensions. Globe uses symmetric encryption (RC4 or AES) to lock files and typically appends custom extensions such as .GLOBE, .PURPLE, .HNY, or others set by the attacker. The malware is distributed through malicious spam emails with infected attachments, compromised websites, and exploit kits. Globe’s flexibility made it attractive to low-skilled actors, resulting in many different variants in the wild. The family has primarily targeted small to medium-sized businesses and individual users across multiple regions, with no clear geographic focus.

Links

Page title Available Last visit URL Screen

Globeimposter

Description

GlobeImposter is a ransomware family that first appeared in mid-2017, designed to mimic the appearance and naming conventions of the earlier Globe ransomware but built on entirely different code. It uses strong encryption algorithms, typically AES combined with RSA, and appends a variety of file extensions to encrypted data—such as .crypt, .doc, .png, .jpg, .spreadsheet, and many more—depending on the campaign. GlobeImposter is primarily distributed via malicious spam campaigns with infected attachments, compromised RDP services, and exploit kits. It drops a ransom note (often named how_to_back_files.html or similar) instructing victims to contact the attackers via email. Over the years, GlobeImposter has spawned hundreds of variants, making it one of the more persistent commodity ransomware threats targeting small businesses and individuals globally.

Links

Page title Available Last visit URL Screen

Good Day

Description

Good Day is a ransomware variant within the ARCrypter family, first observed in May 2023. It gained prominence due to its reticent financial extortion model and custom branding—victims are greeted with a “Good day” message upon landing on individualized Tor-based victim portals. The malware is typically delivered via phishing campaigns disguising payloads as legitimate Windows updates. It utilizes a robust encryption workflow, including deletion of volume shadow copies and process evasion mechanisms. Notably, Good Day has been linked to the Cloak ransomware group through shared data leak infrastructure and overlapping leak portal behaviors.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://47h4pwve4scndaneljfnxdhzoulgsyfzbgayyonbwztfz74gsdprz5qd.onion/

Grep

Links

Page title Available Last visit URL Screen
Home - Grep Hub
⬇️
2025-08-20
http://grep3ql4yhlmpq5zy3en5bvenvfhrpzb6bgnkxeyse6basc7x4sqhgqd.onion/ Screen

Grief

Description

Grief, also known as Pay or Grief, is a ransomware group that emerged in May 2021 and is widely believed to be operated by actors linked to the Evil Corp cybercrime syndicate. It operates as a Ransomware-as-a-Service (RaaS) platform, using a double-extortion strategy: encrypting files while threatening to leak stolen data via its Tor-based leak site. Grief’s ransomware payload uses strong encryption (commonly RSA-2048 + AES-256) and typically appends the .grief extension to files. The group has targeted organizations across multiple sectors, including government, finance, education, and manufacturing, with a focus on U.S. and European entities. Grief has been associated with infrastructure and code overlaps from the earlier DoppelPaymer ransomware and uses phishing emails, malicious attachments, and compromised RDP credentials for intrusion. In late 2021, the U.S. Treasury’s OFAC issued sanctions against Grief due to its ties with Evil Corp, making ransom payments to the group legally risky for victims in the U.S.

Links

Page title Available Last visit URL Screen
Grief list
⬇️
2022-05-02
http://griefcameifmv4hfr3auozmovz5yi6m3h3dwbuqw7baomfxoxz4qteid.onion/
⬇️
Never
http://payorgz3j6hs2gj66nk6omfw65atgmqwzxqbbxnqi3bv2mlwgcirunad.onion/

Grinch

Links

Page title Available Last visit URL Screen

Groove

Description

Groove was a short-lived ransomware group and cybercrime gang that emerged in August 2021 and became notable for its aggressive, publicity-driven tactics. Unlike traditional Ransomware-as-a-Service (RaaS) groups, Groove functioned more as a loose criminal collective, encouraging other threat actors to join forces in attacking U.S. entities, particularly in the government and financial sectors. The group ran a Tor-based leak site where it published stolen data, but its operators claimed to focus more on building an “underground alliance” than on ransomware deployment itself. Analysts noted overlaps between Groove and actors behind Babuk and BlackMatter, as well as forum personas known for data theft operations. By early 2022, Groove’s activity had largely ceased, with some experts suggesting the group was either a short-term recruitment campaign or a misinformation effort.

Links

Page title Available Last visit URL Screen
Утечки | Groove
⬇️
2021-10-30
http://ws3dh6av66sjbxxkjpw5ao3wqzmtejnkzheswm4dz5rrwvular7xvkqd.onion/

Gunra

Description

Gunra is an emerging ransomware group first identified in April 2025. It employs a classic double-extortion model—encrypting sensitive data and exfiltrating it for publication via a Tor-hosted leak site. Since its emergence, Gunra has struck a diverse set of global targets—reportedly spanning sectors like manufacturing, healthcare, IT, real estate, agriculture, and consulting in countries including Brazil, Japan, Canada, Turkey, South Korea, Taiwan, Egypt, and the U.S.

parsing : enabled

Links

Page title Available Last visit URL Screen
Public Data Share
⬇️
2025-08-20
http://gunrabxbig445sjqa535uaymzerj6fp4nwc6ngc2xughf2pedjdhk4ad.onion/ Screen
Error
⬇️
2025-05-14
http://2bw7r32r5eshwk2h7uekj3lwzorxds2jyhyzqyilphid3r27x5hsf4yd.onion Screen
Private Chat with US
⬇️
2025-08-19
http://jzbhtsuwysslrzi2n5is3gmzsyh6ayhm7jt3xowldhk7rej4dqqubxqd.onion/ Screen
⬇️
Never
http://vrlgjxbl6yroq26xkcjpafgmmxrlpawvr4agppna6apfxjxav2mq66ad.onion

Gwisin

Description

Gwisin is a targeted ransomware group first publicly reported in July 2022, believed to operate primarily within South Korea. The group’s name means “ghost” in Korean, reflecting its stealthy approach. Gwisin has been observed conducting attacks on critical sectors, including healthcare, pharmaceutical, and manufacturing industries. It uses custom-built payloads tailored for each victim, capable of encrypting both Windows and Linux/VMware ESXi environments, and often executes attacks during national holidays to maximize operational disruption. Gwisin employs a double-extortion model—exfiltrating sensitive data before encryption—and communicates with victims in Korean-language ransom notes. Initial access vectors are not fully confirmed in open-source reporting, but suspected methods include exploiting vulnerable VPN appliances and leveraging stolen administrative credentials. The group is known for extensive pre-encryption reconnaissance to identify high-value systems and backups.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://gwisin4yznpdtzq424i3la6oqy5evublod4zbhddzuxcnr34kgfokwad.onion/

Hades

Description

Hades is a ransomware group first observed in December 2020, believed by several threat intelligence firms to be operated by, or closely linked to, the Evil Corp cybercrime syndicate. The group has primarily targeted large enterprises in the United States, Canada, and Germany, conducting big-game hunting operations. Hades is not known to operate as an open Ransomware-as-a-Service (RaaS) platform; instead, attacks appear to be conducted by the core operators. It uses a double-extortion model, encrypting systems and threatening to leak stolen data via a Tor-based portal. The ransomware payload is typically deployed after extensive network reconnaissance and lateral movement, often through compromised VPN credentials and exploitation of exposed services. Encrypted files are appended with the .hades extension, and ransom notes direct victims to unique Tor portals for negotiation. Notable sectors affected include manufacturing, transportation, and consumer goods.

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://ixltdyumdlthrtgx.onion
⬇️
Never
http://m6s6axasulxjkhzh.onion/

Handala

Description

Handala (also known as Handala Hack Team, Hatef, Hamsa) is a pro-Palestinian hacktivist group first observed in December 2023. Its operations focus on politically motivated cyber campaigns targeting Israeli entities and organizations associated with Israel globally. Handala employs destructive tactics—primarily using multi-stage wiper malware that affects both Windows and Linux systems—alongside data theft and public exposure through leak sites. They are also known for orchestrating phishing campaigns that masquerade as legitimate alerts (e.g., spoofing CrowdStrike), followed by disabling defenses, injection via AutoIT or Delphi loaders, and destructive payload deployment.

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2025-05-27
https://handala.to/ Screen
Handala Hack Team – Free Palestine
⬆️
2025-08-20
http://handala-hack.to Screen
Handala Hack Team – Free Palestine
⬆️
2025-08-20
http://vmjfieomxhnfjba57sd6jjws2ogvowjgxhhfglsikqvvrnrajbmpxqqd.onion Screen

Haron

Description

Haron is a ransomware group that emerged in July 2021 and is believed to share operational similarities with the Avaddon ransomware, which shut down the month prior. Haron uses a double-extortion model—encrypting victims’ data and threatening to publish stolen files on a Tor-based leak site. The ransomware is written in C# and uses the Salsa20 encryption algorithm with RSA-1024 for key protection. File extensions are typically not changed during encryption, but ransom notes named HOW TO RESTORE YOUR FILES.txt are dropped across affected systems. Initial access methods are not comprehensively documented in public sources but may include phishing campaigns and exploitation of exposed RDP services. Haron’s leak site and negotiation structure closely resemble Avaddon’s, suggesting either code reuse or a shared affiliate network.

parsing : enabled

Links

Page title Available Last visit URL Screen
Clients page
⬇️
2022-01-31
http://ft4zr2jzlqoyob7yg4fcpwyt37hox3ajajqnfkdvbfrkjioyunmqnpad.onion/login.php
Info
⬇️
2022-04-15
http://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad.onion/blog.php

Hellcat

Description

HellCat is a relatively recent ransomware group first observed in late 2024, known for its data-theft and extortion campaigns targeting high-profile organizations. It operates a double-extortion model, exfiltrating sensitive information and threatening to publish it on its Tor-based leak site if ransom demands are not met. The group has been linked to multiple significant breaches, including incidents involving Schneider Electric and Capgemini, where large volumes of corporate data were allegedly stolen. HellCat’s payloads and leak infrastructure suggest a custom-built platform rather than a widely shared RaaS, and some incidents have involved only data exposure without confirmed encryption events. The group has drawn attention for recruiting or collaborating with high-profile threat actors, including the persona “Grep,” who acts as a public representative in some extortion cases.

parsing : enabled

Links

Page title Available Last visit URL Screen
Redirect to Mirror
⬇️
2025-07-15
http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion Screen
Index of /
⬇️
2024-12-28
http://r7i4vprxr2vznmhnnxj36264ofwx6extopdz535f5v357nqacifymbad.onion/ Screen
Just a moment...
⬆️
2025-08-20
http://hellcat.rw Screen
HELLCAT | Files
⬆️
2025-08-20
http://hcatxn4ppkgmakaatrq6bsbhqk5ouhviygyx57gljjt5iseul5nvpayd.onion Screen
404 Not Found
⬇️
2025-07-15
http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion/api2.php?action=victims Screen

Helldown

Description

Helldown is an emerging ransomware group first identified in August 2024, known for its fast-evolving and cross-platform threat capabilities. It exploits critical vulnerabilities—most notably CVE-2024-42057 in Zyxel firewalls—for initial access and demonstrates modular design and anti-detection mechanisms. Helldown targets both Windows and Linux environments, including VMware and ESXi systems. It employs a double-extortion strategy: encrypting files with randomized extensions via executables like hellenc.exe, and threatening victims with data dump releases via its Tor-hosted leak site.

parsing : enabled

Links

Page title Available Last visit URL Screen
Helldown Leaks
⬇️
2024-08-25
http://onyxcgfg4pjevvp5h34zvhaj45kbft3dg5r33j5vu3nyp7xic3vrzvad.onion/ Screen
Helldown Leaks
⬇️
2024-11-21
http://onyxcym4mjilrsptk5uo2dhesbwntuban55mvww2olk5ygqafhu3i3yd.onion Screen
www.helldown.org - ICANN Verification Needed | Namecheap.com
⬆️
2025-08-20
http://www.helldown.org Screen
⬇️
Never
http://onyxcb44xvqra35m3lp3z26kf2pxrlbn64nbzvyvzjyc3uykzrwcjdid.onion

Hellogookie

parsing : enabled

Links

Page title Available Last visit URL Screen
HelloGookie
⬇️
2024-07-17
http://gookie256cvccntvenyxrvn7ht73bs6ss3oj2ocfkjt5y6vq6gfi2tad.onion/ Screen

Hellokitty

Description

HelloKitty is a ransomware family first observed in November 2020, named after a string found in its binary. It operates as a human-operated, big-game hunting ransomware, manually deployed after network intrusion and reconnaissance. HelloKitty uses a double-extortion model—encrypting files and threatening to leak stolen data on a Tor-based site. The malware encrypts files using AES-256 in CBC mode with RSA-2048 to protect keys, appending extensions such as .crypted or campaign-specific suffixes. Distribution typically occurs via compromised RDP credentials, phishing, or exploitation of known vulnerabilities. The group gained notoriety in February 2021 after attacking CD Projekt Red, the developer of The Witcher and Cyberpunk 2077, stealing source code for several games. Subsequent variants have targeted both Windows and Linux systems, including ESXi servers.

Links

Page title Available Last visit URL Screen
News
⬇️
2021-10-02
http://3r6n77mpe737w4sbxxxrpc5phbluv6xhtdl5ujpnlvmck5tc7blq2rqd.onion
⬇️
Never
http://gunyhng6pabzcurl7ipx2pbmjxpvqnu6mxf2h3vdeenam34inj4ndryd.onion/

Help_Restoremydata

Description

Help_restoremydata is a ransomware variant identified around late 2024/early 2025, notable for appending the .help_restoremydata extension to encrypted files. It changes the victim’s desktop wallpaper and drops a ransom note titled HOW_TO_RECOVERY_FILES.html to instruct victims on how to pay for decryption. Initial discovery appears to stem from underground forum monitoring and threat intelligence assessments, marking it as emerging but not widely distributed. Technical details beyond these behaviors—such as encryption algorithms or distribution mechanisms—have not been documented in major cybersecurity advisories. .help_restoremydata ext : .help_restoremydata note : HOW_TO_RECOVERY_FILES.html

Links

Page title Available Last visit URL Screen
Enter your ID
⬇️
2025-01-27
http://gzdn6yjvmrujiqzz4wwuykrta7jtkv2fupb7aozwx7yxnxhj737v2qad.onion/ Screen

Hermes

Description

Hermes is a ransomware family first observed in the wild in February 2017, believed to have been developed by a group operating out of Asia. It originally appeared as a Ransomware-as-a-Service (RaaS) offering on underground forums but later saw deployment in targeted attacks. Hermes uses AES-256 encryption to lock victim files and appends a variety of extensions (including .hrm and campaign-specific variants). The ransom note, often named DECRYPT_INFORMATION.html or DECRYPT_INFORMATION.txt, provides payment instructions via email. The ransomware gained notoriety in 2018 when it was used as a destructive wiper in the Far Eastern International Bank (FEIB) heist in Taiwan, where attackers deployed Hermes to cover their tracks after a SWIFT fraud operation. Over time, Hermes code has been re-used and integrated into other ransomware families, including some Ryuk builds, suggesting code sharing or purchase from the original developer. Distribution vectors have included phishing campaigns, malicious attachments, and exploitation of RDP services.

Links

Page title Available Last visit URL Screen

Himalayaa

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://ohu6eschnuhxfg46wvco7j3e76oqymo4cowfepbi7h6z3vf6if6lj5yd.onion/

Hive

Description

Hive is a strain of ransomware that was first discovered in June 2021. Hive was designed to be used by Ransomware-as-a-service providers, to enable novice cyber-criminals to launch ransomware attacks on healthcare providers, energy providers, charities, and retailers across the globe. In 2022 there was a switch from GoLang to Rust.

parsing : enabled

Links

Page title Available Last visit URL Screen
This domain has been seized
⬇️
2023-05-26
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ Screen
This domain has been seized
⬇️
2023-05-26
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion Screen
This domain has been seized
⬇️
2023-05-26
http://hiveapi4nyabjdfz2hxdsr7otrcv6zq6m4rk5i2w7j64lrtny4b7vjad.onion/v1/companies/disclosed Screen

Holyghost

Description

HolyGhost is a ransomware group first publicly reported in July 2022, believed to be operated by a North Korean state-sponsored threat actor tracked as APT43 or Andariel, a subgroup of the Lazarus Group. The group has been active since at least June 2021, using a double-extortion model that combines encryption of victim files with threats to leak stolen data via a Tor site. Early HolyGhost variants (BTLC_C.exe) used a custom file extension .h0lyenc, while later builds added more robust encryption, obfuscation, and evasion capabilities. Targeted victims include small and medium-sized businesses in manufacturing, finance, education, and event planning, primarily in the United States, South Korea, Brazil, and India. Intrusion methods include exploitation of vulnerable public-facing applications, credential theft, and possibly the use of purchased access from other threat actors. Unlike purely criminal groups, HolyGhost is suspected of being leveraged for both revenue generation and strategic cyber operations in support of DPRK objectives.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://matmq3z3hiovia3voe2tix2x54sghc3tszj74xgdy4tqtypoycszqzqd.onion

Homeland

Links

Page title Available Last visit URL Screen
403 Forbidden
⬆️
2025-08-20
http://homelandjustice.ru Screen

Hotarus

Description

Hotarus is a ransomware and data extortion group first observed in March 2021, believed to be linked to threat actors of Latin American origin. The group has targeted entities in South America and the United States, including financial institutions, government agencies, and private companies. Hotarus is known for deploying both custom ransomware and publicly available tools, alongside stealing sensitive information for double-extortion purposes. The group has been observed exploiting vulnerable web services, using stolen credentials, and leveraging publicly available post-exploitation frameworks to gain persistence in victim networks. Encrypted files are typically appended with extensions such as .hotarus or campaign-specific identifiers, and ransom notes direct victims to communicate via encrypted email services. Notably, in some campaigns, Hotarus deployed data leak threats without encrypting files, focusing solely on exposure as a pressure tactic.

Links

Page title Available Last visit URL Screen
Hotarus Corp
⬇️
2021-10-22
http://r6d636w47ncnaukrpvlhmtdbvbeltc6enfcuuow3jclpmyga7cz374qd.onion

Hunters

Description

Hunters International is a ransomware group first identified in October 2023, believed to have taken over or rebranded from the now-defunct Hive ransomware operation. Shortly after its emergence, security researchers found significant code overlaps with Hive, suggesting that Hunters International either acquired Hive’s source code or involved former Hive developers. The group operates a double-extortion model—encrypting victim data and threatening to leak it on a Tor-based site. It has targeted organizations worldwide across healthcare, manufacturing, education, and government sectors. The ransomware is written in Rust, supports both Windows and Linux/ESXi environments, and appends extensions such as .locked to encrypted files. Initial access is typically obtained via compromised RDP credentials, phishing campaigns, or vulnerabilities in exposed systems.

parsing : enabled

Links

Page title Available Last visit URL Screen
HUNTERS INTERNATIONAL
⬇️
2025-07-17
https://hunters55rdxciehoqzwv7vgyv6nt37tbwax2reroyzxhou7my5ejyid.onion Screen
HUNTERS INTERNATIONAL
⬇️
2025-07-17
https://hunters33mmcwww7ek7q5ndahul6nmzmrsumfs6aenicbqon6mxfiqyd.onion/login Screen
Error
⬇️
2024-09-24
https://huntersinternational.net Screen
Срок регистрации домена истек
⬇️
2025-05-26
http://huntersinternational.su Screen
⬇️
Never
http://hunters55wwmd25ycahnbn5xh45hvtwbmby6ly4p6qee5pughbyrajqd.onion
⬇️
Never
http://hunters33dootzzwybhxyh6xnmumopeoza6u4hkontdqu7awnhmix7ad.onion

Icefire

parsing : enabled

Links

Page title Available Last visit URL Screen
Leakage List
⬇️
2022-08-24
http://kf6x3mjeqljqxjznaw65jixin7dpcunfxbbakwuitizytcpzn4iy5bad.onion/board/leak_list/ Screen
Leakage List
⬇️
2023-03-13
http://7kstc545azxeahkduxmefgwqkrrhq3mzohkzqvrv7aekob7z3iwkqvyd.onion/board/victim_list/ Screen
None
⬇️
Never
http://nxx3cy6aee2s53v7v5pxrfv7crfssw7hmgejbj47cv6xuak3bgncllqd.onion/

Imn Crew

parsing : enabled

Links

Page title Available Last visit URL Screen
IMN Crew#
⬇️
2025-08-06
http://imncrewwfkbjkhr2oylerfm5qtbzfphhmpcfag43xc2kfgvluqtlgoid.onion/ Screen

Inc Ransom

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
INC Ransom
⬇️
2024-07-10
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion Screen
Access Blocked
⬇️
2024-04-03
http://incapt.blog/ Screen
Error Response Page
⬇️
2024-07-22
http://incapt.su/blog/leaks Screen
Disclosures
⬆️
2025-08-20
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures Screen
None
⬇️
Never
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
NULL
⬆️
2025-08-20
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/ Screen
⬆️
2025-08-20
http://incbacg6bfwtrlzwdbqc55gsfl763s3twdtwhp27dzuik6s6rwdcityd.onion Screen
⬇️
2025-01-02
http://incbackend.top Screen
None
⬇️
Never
http://incbackfgm7qa7sioq7r4tdunoaqsvzjg5i7w46bhqlfonwjgiemr7qd.onion
None
⬇️
Never
http://incbackrlasjesgpfu5brktfjknbqoahe2hhmqfhasc5fb56mtukn4yd.onion

Inpivx

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http:// ransomyktqx2m3xg.onion/

Insane Ransomware

Description

Insane is a relatively obscure ransomware family first reported in late 2021, with few confirmed incidents in public threat intelligence. It encrypts victim files using symmetric encryption (AES) combined with RSA for key protection and appends the .insane extension to affected files. The ransom note, typically named INSANE_README.txt, directs victims to contact the operators via email for decryption instructions. Based on limited reporting, Insane does not appear to operate as a Ransomware-as-a-Service (RaaS) platform; instead, it seems to be deployed by the core operators in targeted attacks. Initial access methods are not well-documented, but suspected vectors include phishing attachments and exploitation of exposed RDP services. The group’s small footprint in open-source intelligence suggests limited distribution or use in highly selective campaigns.

parsing : enabled

Links

Page title Available Last visit URL Screen
Going insane
⬇️
2024-02-12
http://nv5lbsrr4rxmewzmpe25nnalowe4ga7ki6yfvit3wlpu7dfc36pyh4ad.onion/ Screen
Going insane
⬇️
2024-02-12
http://gfksiwpsqudibondm6o2ipxymaonehq3l26qpgqr3nh4jvcyayvogcid.onion/ Screen
Inane Right
⬇️
2024-02-12
http://gfksiwpsqudibondm6o2ipxymaonehq3l26qpgqr3nh4jvcyayvogcid.onion/Insane.html Screen
Inane Right
⬇️
2024-02-12
http://nv5lbsrr4rxmewzmpe25nnalowe4ga7ki6yfvit3wlpu7dfc36pyh4ad.onion/Insane.html Screen
Going insane
⬇️
2024-02-12
http://r2ad4ayrgpf7og673lhrw5oqyvqg4em2fpialk7l7gxkasvqkqow4qad.onion/ Screen
Inane Right
⬇️
2024-02-12
http://r2ad4ayrgpf7og673lhrw5oqyvqg4em2fpialk7l7gxkasvqkqow4qad.onion/Insane.html Screen

Interlock

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Interlock
⬆️
2025-08-20
http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/ Screen
Interlock
⬆️
2025-08-20
http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/leaks.php Screen
⬇️
2025-04-03
http://zmqolc6yrdgn24w7eaaf4pfm235x65zbeggr4byk7og3crhcwn7sqeyd.onion Screen
⬇️
2025-04-03
http://4awnzgndu5u3bb6vne2vixizdftkc4mdlz45lnrhjgelzm5ujywxmuqd.onion/index.php?p= Screen
⬇️
2025-04-03
http://hp4fxytyky26q3kpgqlhewhrazaag5wg4jsaiwxlv3lkd7r7rmsamqyd.onion/index.php?p= Screen
⬆️
2025-08-20
http://soqdfmnocwg47ixineyzlhyem5tx3fju4hadydwob7fk4oyldxhju4ad.onion/index.php?p= Screen
⬇️
2025-04-03
http://sya5wcoyib7rozq6cjrdmrrunucqehkuzxs6rkrkffukkn5urq6bv7yd.onion/index.php?p= Screen
⬇️
2025-04-03
http://4ep4zkhqqg3kihqlbpsppld4qvg7c7llotilezqr6evbazqbmcwu6fyd.onion/index.php?p= Screen
⬆️
2025-08-20
http://hsthebgwlp6xxnhgmvmgukyzxuyaqkx5uqncg56wib7byonddo5k6myd.onion/index.php?p= Screen
⬇️
2025-04-03
http://z7yjie5fejolxvscc3lralybnhynajewnqinjfdasoqa2mt2ixjnelqd.onion/index.php?p= Screen
Interlock
⬆️
2025-08-20
http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/support/step.php Screen
Index of /
⬇️
2025-04-03
http://53pkw34sr5aohkkpg4w3nz4wpsqod5mxdqer3hijrz2btv2pe3vncgad.onion Screen
⬇️
Never
http://74yeft3x7wvqnscbzfdljnvnmflnlib2b6mhu6a3arc3vvpi4qbrt2qd.onion
⬇️
Never
http://7baltffgfltbjh26fd62h2ieeomdcpro44xwkdqipbn5dtuklgkigkyd.onion
⬇️
2025-04-03
http://fkdhvlseh3xyeugsu54frnui62zjrfpeb2v5rm44b53iopcr3h4flxyd.onion Screen
⬆️
2025-08-20
http://hmrr2zllzzxxrdqi5ktjflpga4skdnxm4wvzgkkl72apofvczmsno2ad.onion Screen
Index of /
⬇️
2025-04-03
http://hvhidyqcyj4dozqdxuongpcs2yffjs2ojhazrncqi5cr4hhx3ljopiqd.onion Screen
404 Not Found
⬇️
2025-04-03
http://sjd7ssbiptl62jktrwc5yffsh4llljx7hswfltnfkttq47gdjlpknxid.onion Screen
⬇️
Never
http://zmdmlidqqrxbkyqkqttbsbticjbofjs5uzwecqvdxfadvsjw7mp5kjyd.onion
⬆️
2025-08-20
http://tyrvuuh5tvrvk4x6lfxrvgabqmzpnxehelmdqztu3vekujcknvl2ufad.onion/ Screen
⬆️
2025-08-20
http://k5pmfzuqwxr2uhnskktjicbnzr633zejupe54yginljj3mgoysfwe4id.onion/ Screen
⬆️
2025-08-20
http://65bhkrfbqnfjgcsr7456luzjauw5nikuwxradlysivy5wbttjikdhxid.onion/ Screen
⬆️
2025-08-20
http://k6oor2g5bfvdxhxr2g6fczu3iqldbzyavydk56lh6z7ex7n7wqg4eryd.onion/ Screen
⬆️
2025-08-20
http://tpwgxrocjvlonhrfjm4jx3dore2u4brxfj4ikt7iba36c23svthhf7ad.onion/ Screen
⬇️
2025-03-12
http://7hhhjnxeps222bydmavgawgw5mzkdnduuzifpobycjwsdryix2szlnqd.onion/ Screen
404 Not Found
⬆️
2025-08-20
http://ljurl2gqwtgfqzk6pkz5ggtdrdrpzpzzkdvf4jhpkk33dnwkcsmdi4ad.onion/ Screen
⬆️
2025-08-20
http://hhmbi4q4sy7m7oyfrpjkxparnrrwijna3ncucu3vwc24v7xhjvst7nqd.onion/ Screen
⬆️
2025-08-20
http://gmgcrvr2piu5wl7eh7vuw3cyrunksox5d4zhvdkgd3kbnwbgvrglkjad.onion/ Screen
⬆️
2025-08-20
http://5mk7t3hpdjei4ezymeog3kfsjmfxghvwr5ekerdilitafolstou5vpid.onion/ Screen
⬆️
2025-08-20
http://gxtrbmin7uses7lo6ryg6zdik6pevsjhk42zzlos7dbwpsfrqd6osjad.onion/ Screen
⬇️
2025-08-18
http://5f7erlowczufe5cntt37ljhibswckyyxj4wrtuepdyygvooozkqpciid.onion/ Screen
⬆️
2025-08-20
http://e762chqol5savlrfqljepxwtozrxxwarkuyhqps2n34tm3rliff4beqd.onion/ Screen
⬆️
2025-08-20
http://k5nuvkinhjd3nf75zb452xl5oxtdhg4hucmui5n72fou3frw6e25v5id.onion/ Screen
⬇️
2025-08-19
http://ad7tx2oyln5g6yk7turvhjxhqvunfucuiq5iwzc5odlomft7tvysxvqd.onion/ Screen
⬇️
2025-08-18
http://z6xr75yrgbry3a7zxc734sac2u6libikshm2j5tsbrh5geq7ilik3nad.onion/ Screen
⬇️
2025-08-20
http://xbgiykmt3v25qkspndphfdktiezfeesq6t45ewsrizid5s37ljgs25ad.onion/ Screen
⬆️
2025-08-20
http://523gzulwswe5tfevqlrxvqqh2fxo2mwrs2irnjel4mtu7qodgdu2ccyd.onion/ Screen
⬇️
2025-08-20
http://yp7yctliltdy3mdrdd2lfvcjx2xgcxrbvycje47jn6fbceurgznnapqd.onion/ Screen
⬆️
2025-08-20
http://6mwjyc64rnkht3qc4bv7svpufmbvm3k73vekxgdlsbqzx5toueq3ndyd.onion/ Screen
⬇️
2025-08-20
http://ivaoowg6juugqyn4tfpt2ilmwx3ea47c6ijxwlvgvrc6pemuwdywn6yd.onion/ Screen
⬇️
2025-07-09
http://5eyzyzb6boe4dud4pwcuyigd54k262xf53z6zqkxs6gyzcfhoj2utcqd.onion/ Screen
⬇️
2025-08-20
http://ernx4wj3gzhlqxhlrsrsfxe3hd275uny7w3yorhbgwp7jlsxv23rolqd.onion/ Screen
⬆️
2025-08-20
http://3zzis52fvjbhoo2i5gyrmoeofqdr3m45jyvltuamxzktt77grsuczxid.onion/ Screen
⬆️
2025-08-20
http://6476eeaclqfjhnlusdwcui7i5mqxmo6i4evxi7jhqxemx2s6rtucxead.onion/ Screen
⬆️
2025-08-20
http://cbmeu74emtvhqr7cwbq4aaui4qw4f2kui674fuoeowwd6oem33bzf7yd.onion/ Screen
⬇️
2025-08-20
http://iwdzb7nnphh2rffdygryptldmr5ip3lk6dejfwn6qlbtvyipqxzbwdyd.onion/ Screen
⬇️
2025-08-20
http://vdo2l4ujgxfcucbhnzdd4745sbbd2vnnkj4csyf5blds2qomguubx5yd.onion/ Screen
⬆️
2025-08-20
http://gd2cx4zvobqui6ssbbroferiv6oxlqyyy447aqpp2socxvvdu5rooyid.onion/ Screen
⬇️
2025-07-08
http://af2o3nw2txv3u2vfwntytytw73cgplcsaf7zccrg3xxcwzapu3sgydad.onion/ Screen
⬇️
2025-07-09
http://key55aknlvgxs57kapodjw55ww23ryxbwfgwki5334gs5ok73wntdmyd.onion/ Screen
⬆️
2025-08-20
http://5hiynrduugrjbzxluostnxmitaer62obvfyrfxnqkdeog2ejpxhzuqid.onion/ Screen
⬇️
2025-08-20
http://zdn5uv663oiffbrloxalsdl4v3lg73elrnuso47rbuavu6bmhqvd2wqd.onion/ Screen
⬇️
2025-07-09
http://63dxcqyjooi55s2x25aqsvrykywmmaaoxj4kc23kdboyxyng2zqtkbyd.onion/ Screen
⬇️
2025-07-09
http://rqkmahiz55v6bgogfgyni5h7v4sq3bgayycpa6u4c7if7kpvrylcrmad.onion/ Screen
⬇️
2025-07-09
http://fe3klmmbb7upoybd45ayjkxebqxaxukleu2w56kgo67rcnrxlalrxdad.onion/ Screen
⬇️
2025-08-20
http://nz5rdh2alikmxiyojqx52yhzxdqfty3jwtvcybqajxrkbtsk36jy4aqd.onion/ Screen
⬇️
2025-08-20
http://u2qvcxl65guk4lxi2lyxq5zwlgnq7ojahihr4ipl7a3wcui6pvff7dyd.onion/ Screen
⬆️
2025-08-20
http://lbqgjosup47uopyrlvbylzixcp7l5rsrxcdv3y4vy23cczcftsr6imad.onion/ Screen
⬆️
2025-08-20
http://bt52afulf6zsk3xhzceam6ukipw2wrzpfsizlizdcootn5bc4ewzr7ad.onion/ Screen
⬆️
2025-08-20
http://ir3oqafizlapipdyrebrfuk5bxd56zqjemljvfkeb42nzpxvkxwmqpqd.onion/ Screen
⬆️
2025-08-20
http://vdnoyjrxieoikuqu3rpathtejvgl4xc6laihepyoyhw7tmuyxxhtvrqd.onion/ Screen
⬆️
2025-08-20
http://xqcx7b57dd5vrqllokebwuvub4hk3viktn4lsgyt2bg67oujd42xolqd.onion/ Screen
⬆️
2025-08-20
http://dnyyuk3nevegj37tnv3xav57c5twomc7uqsfbjlkwto3p4spzfop47qd.onion/ Screen
⬇️
2025-08-20
http://c4xaaynebochyp6ccvxi2bzbvncosdhqcb65cjuqwgqcljlul5gbrhyd.onion/ Screen

Invaderx

Links

Page title Available Last visit URL Screen

J Group

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Home | J Blog
⬆️
2025-08-20
http://twniiyed6mydtbe64i5mdl56nihl7atfaqtpww6gqyaiohgc75apzpad.onion/ Screen
J
⬆️
2025-08-20
http://w4d5aqmdxkcsc2xwcz7w7jo6wdmvmakgy3y6mfmdtzmyvxe77cjkfbad.onion/ Screen
torrents
⬇️
2025-08-20
https://share.jtor.xyz/torrents/ Screen

Jaff

Description

Jaff is a ransomware family first discovered in May 2017, notable for its distribution via large-scale spam campaigns operated by the Necurs botnet. These campaigns delivered malicious PDF attachments that contained embedded Word documents with macros, which, when enabled, downloaded the ransomware payload. Jaff encrypts victim files using RSA and AES encryption and appends extensions such as .jaff, .wlu, or .sVn depending on the variant. The ransom note, typically named ReadMe.html or ReadMe.bmp, directs victims to a payment site hosted on the Tor network. The ransomware demands payment in Bitcoin and displays a custom payment portal interface. Jaff was initially believed to be linked to the Locky ransomware operators due to similarities in distribution methods, ransom portal design, and its use of Necurs, though later analysis suggested it was operated by a separate group. Its activity was short-lived, with most campaigns ceasing within weeks of its discovery.

Links

Page title Available Last visit URL Screen
⬇️
Never
http://rktazuzi7hbln7sy.onion/

Jigsaw

Description

Jigsaw is a ransomware family first observed in April 2016, notorious for its psychological intimidation tactics. It encrypts files using AES encryption and appends various extensions (e.g., .fun, .kkk, .btc) depending on the variant. The ransomware’s ransom note features imagery of the “Billy” puppet from the Saw movie franchise and displays a countdown timer. Jigsaw is unique in that it deletes a portion of the victim’s files every hour until the ransom is paid, escalating the number of deletions over time to increase pressure. The note typically instructs victims to pay in Bitcoin via email communication. The malware is written in .NET, and numerous versions have circulated since its emergence, many of which are decryptable due to coding flaws. Jigsaw has mainly been spread via malicious email attachments and exploit kits. While it had a period of high activity in 2016–2017, most modern antivirus tools can easily detect and block it.

Links

Page title Available Last visit URL Screen

Jo Of Satan

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://jos666vxenlqp4xpnsxehovnaumi4c3q4bmvhpgdyz7bsk3ho3caokad.onion/

Jsworm

Description

JSWorm is a ransomware family that first appeared in May 2019 and is notable for undergoing multiple rebrands and evolutions, later appearing under names such as Nemty, Nefilim, Offwhite, Fusion, and Milihpen. Initially, it was distributed via malicious spam emails containing JavaScript files, hence the “JS” in its name. Later versions moved to targeted intrusions, leveraging compromised RDP services and vulnerable network appliances for initial access. JSWorm encrypts files using AES-256 encryption with RSA-2048 for key protection and appends campaign-specific extensions (e.g., .JSWORM, .Nemty, .Nephilim). The group adopted a double-extortion model in its later stages, stealing data before encryption and threatening to leak it via Tor-hosted sites. Its victimology spans various sectors worldwide, including manufacturing, energy, healthcare, and professional services. The continuous rebranding suggests an effort to evade detection, disrupt attribution, and maintain pressure on victims.

Links

Page title Available Last visit URL Screen

Justice_Blade

Links

Page title Available Last visit URL Screen
Just a moment...
⬆️
2025-08-20
https://justice-blade.io Screen

Kairos

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Stolen data
⬆️
2025-08-20
http://nerqnacjmdy3obvevyol7qhazkwkv57dwqvye5v46k5bcujtfa6sduad.onion Screen
403 Forbidden
⬇️
2025-02-06
http://dwgxeoaqykd3zdkhol5xpgsqabp4lys4ea7qpl3f2b75b2sdsex644id.onion/files/ Screen
404 Not Found
⬇️
2025-05-27
http://dngqgtcqcz5hgjvk4encs4vfyzucx3gtmov5a4eltvovux4nvazbx6ad.onion/files/ Screen
403 Forbidden
⬇️
2025-08-20
http://usqa5b33yyc2u6kqf5au64cgj64acl2umtll76qutlmu7fckw6kh6wqd.onion/files/ Screen
Files
⬇️
2025-08-02
http://esmhbczpio7umfnxog6bk23q3nok5fjuik2dttegvezqngg2oqklo7yd.onion/ Screen
Files
⬇️
2025-07-25
http://2msn5sp3af3iy2ozj4235ccsb7pnpp4tkzyxdpzutyc2sxb3mujicfyd.onion/ Screen
None
⬇️
Never
http://pj6dzqat4n4hwb625a4qjpuzd3bzrjgw5zlwa3l6uiazdwjcib3y6ad.onion/
title – Just another WordPress site
⬆️
2025-08-20
http://vpj6dzqat4n4hwb625a4qjpuzd3bzrjgw5zlwa3l6uiazdwjcib3y6ad.onion/ Screen

Karakurt

Description

Karakurt is a financially motivated cybercrime group first publicly identified in June 2021, specializing in data extortion without file encryption. Instead of deploying ransomware to lock systems, Karakurt focuses on gaining access to victim networks, exfiltrating sensitive data, and threatening to leak it on its Tor-based site unless payment is made. The group has targeted victims across North America and Europe in industries including healthcare, manufacturing, education, and professional services. Intrusion methods include phishing, exploitation of vulnerabilities, and purchasing access from initial access brokers. Karakurt’s leak site lists stolen files in stages to pressure victims, sometimes publishing entire data sets if ransoms are not paid. The group is believed to have operational links to the Conti ransomware syndicate, based on shared infrastructure, overlapping victimology, and timing of activity.

parsing : enabled

Links

Page title Available Last visit URL Screen
Magazine
⬇️
2024-08-02
https://3f7nxkjway3d223j27lyad7v5cgmyaifesycvmwq7i7cbs23lb6llryd.onion/ Screen
⬇️
2023-06-16
https://www.karanews.live Screen
⬇️
2023-06-16
https://www.karanews.live Screen
403 Forbidden
⬇️
2025-03-29
https://karakurt.tech Screen
⬆️
2025-08-20
https://karaleaks.com Screen
⬇️
Never
https://omx5iqrdbsoitf3q4xexrqw5r5tfw7vp3vl3li3lfo7saabxazshnead.onion/
⬇️
Never
http://53dxw3yoeirahqn263a7ihzv2hhsjzdgvwqxdcuujlsrctmqzsph6tid.onion
⬇️
Never
http://jo7jezin3bmprlivyleqfv7rq3j4m36hd7bf2bguabxf2rlyrvrjwhad.onion
⬇️
Never
http://nrulhk2lbzt7jw6tnsq6gkjrn37j7uwfu5oxbuxezgherhuhakl2tqid.onion
⬇️
Never
https://t5sb509msc3q4ls06o1g8e4egfxl1o7e79yvlldakfphc0nf7rwiyphv.onion

Karma

Description

Karma is a ransomware group first observed in November 2021, operating a double-extortion model that combines data theft with encryption. The group primarily targets enterprises across various sectors, including healthcare, manufacturing, and technology, with confirmed victims in North America, Europe, and Asia. Karma is believed to be a rebrand or evolution of the FiveHands ransomware, itself derived from the earlier HelloKitty codebase, based on overlaps in encryption methods and ransom portal design. The ransomware appends the .KARMA extension to encrypted files and leaves ransom notes named KARMA-README.txt, directing victims to a Tor-based negotiation site. Initial access is typically obtained through compromised VPN credentials, exploitation of vulnerabilities in public-facing systems, and use of access brokers. Unlike some groups, Karma operators claim to avoid encrypting systems in healthcare emergency services, instead focusing on exfiltration and extortion.

Links

Page title Available Last visit URL Screen
Karma Leaks
⬇️
2021-11-05
http://3nvzqyo6l4wkrzumzu5aod7zbosq4ipgf7ifgj3hsvbcr5vcasordvqd.onion

Kasseika

Description

Kasseika is a ransomware variant first publicly reported in January 2024, identified as a new evolution of the BlackMatter/LockBit ransomware codebase. The malware appends the .kasseika extension to encrypted files and uses a double-extortion model, combining file encryption with threats to publish stolen data on a Tor-based leak site. Early analysis revealed that Kasseika shares several traits with LockBit 3.0, including encryption routines, obfuscation methods, and ransom note structure, but with modified branding and negotiation portals. Initial access vectors have not been widely confirmed, though patterns from related ransomware suggest the use of compromised credentials, RDP exploitation, and vulnerabilities in public-facing services. Victims have been observed in North America, Europe, and Asia, spanning industries like manufacturing, logistics, and professional services.

Links

Page title Available Last visit URL Screen

Kawa

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Kawa4096
⬇️
2025-08-16
http://kawasa2qo7345dt7ogxmx7qmn6z2hnwaoi3h5aeosupozkddqwp6lqqd.onion Screen

Kelvin Security

Description

Kelvin Security is a cybercrime group active since at least 2013, primarily known for hacktivism, data breaches, and website defacements rather than traditional ransomware operations. The group has claimed responsibility for intrusions targeting government agencies, educational institutions, and private companies across multiple regions, including Latin America, Europe, and the Middle East. While it has engaged in data theft and leak threats, there is no confirmed evidence that Kelvin Security operates a ransomware encryption component. Instead, their extortion model focuses on stealing sensitive data and threatening public disclosure, often publicizing breaches via social media and underground forums. The group’s activities have been linked to politically motivated campaigns as well as financially motivated breaches. Victim selection appears opportunistic, exploiting vulnerabilities in web servers, poorly configured databases, and exposed credentials.

Links

Page title Available Last visit URL Screen
404 Error: Page Not Found | Wix.com
⬆️
2025-08-20
https://kelvinsecteamcyber.wixsite.com/my-site/items Screen

Key Group

Links

Page title Available Last visit URL Screen

Killsec

parsing : enabled

Links

Page title Available Last visit URL Screen
504 Gateway Time-out
⬇️
2024-11-25
http://kill432ltnkqvaqntbalnsgojqqs2wz4lhnamrqjg66tq6fuvcztilyd.onion/ Screen

Killsec3

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
⬆️
2025-08-20
http://ks5424y3wpr5zlug5c7i6svvxweinhbdcqcfnptkfcutrncfazzgz5id.onion/posts.php Screen
⬆️
2025-08-20
http://ks5424y3wpr5zlug5c7i6svvxweinhbdcqcfnptkfcutrncfazzgz5id.onion Screen
403 Forbidden
⬆️
2025-08-20
http://xo4o2o2ezgydykywn6zkyqx7toio6z5rzvmjyakgtgkk22vv7223jmqd.onion/ Screen

Knight

Description

Knight is a Ransomware-as-a-Service (RaaS) operation first observed in August 2023, believed to be a rebrand or evolution of the Cyclops ransomware family. The ransomware targets both Windows and Linux/ESXi systems, encrypting files with strong symmetric and asymmetric cryptography and appending the .knight extension. Knight affiliates employ a double-extortion model, stealing sensitive data before encryption and threatening to leak it via a Tor-based site. Distribution methods include phishing campaigns delivering malicious attachments, exploitation of vulnerabilities in public-facing services, and use of previously compromised credentials. The ransomware is modular, allowing affiliates to deploy only the components needed for a given environment, and has been used in attacks on healthcare, manufacturing, finance, and technology sectors across North America, Europe, and Asia. Knight’s leak site lists victims with partial data dumps to pressure payment, escalating to full leaks if negotiations fail.

parsing : enabled

Links

Page title Available Last visit URL Screen
Blog
⬇️
2024-02-14
http://knight3xppu263m7g4ag3xlit2qxpryjwueobh7vjdc3zrscqlfu3pqd.onion/ Screen
⬇️
Never
http://3r7zqtidvujbmfhx52sb34u4vwkh66baefmqzlbqpcnwm3krzipy37yd.onion/
⬇️
Never
http://uzfrntnmwojla5v4w3xvpxerjg43kuzqxmtspqhi5qclwtof5ibgonyd.onion
⬇️
Never
http://r6chas4skrvna72fg5ui3cqkke4fnpinsskvlo57aiolrrdb3r777mqd.onion
⬇️
Never
http://vdyummkrwpjg5ufzefpsqlei5jgfulgci42fjraslavxeegsodei2tyd.onion
⬇️
Never
http://apem3txac4a74co33eceffd3yrfsufhebdzjc5zvjlie53wius2gbtyd.onion

Kraken

Description

Kraken leak blog (hellokitty) Kraken is a ransomware family first observed in August 2018 as a Ransomware-as-a-Service (RaaS) operation promoted on underground forums. The malware encrypts files with AES encryption (keys protected with RSA) and appends the .kraken extension to encrypted files. Early versions distributed by affiliates were bundled with Azorult spyware, enabling credential and cryptocurrency wallet theft before encryption. Kraken’s operators enforced strict rules for affiliates, including geographic restrictions on attacks, and provided customizable ransom notes and payment portals. Victims were instructed to pay in Bitcoin via Tor-hosted sites. Distribution methods included malicious email attachments, compromised RDP services, and downloads from malicious or compromised websites. Although its activity declined significantly after late 2018, Kraken remains notable for its hybrid model of ransomware deployment combined with credential theft.

parsing : enabled

Links

Page title Available Last visit URL Screen
Kraken leak blog
⬆️
2025-08-20
http://krakenccj3wr23452a4ibkbkuph4d6soyx2xgjoogtuamc3m7u7wemad.onion/ Screen
Index of /
⬆️
2025-08-20
http://zq3k4odlfpbzc5y4sxqgolivelxepceaakru3xqo4ll2czmvvtek2ryd.onion/ Screen
Index of /
⬆️
2025-08-20
http://t3uouzfvsaqurb2rzoe2mkpetp54d7lgtl45ply34v5lugsnzysmkhid.onion/ Screen
⬇️
2025-07-11
http://xbupelqsy7lubogl6kdtdqguxoleehbxnuuqm2dos6bbmdwablpqckad.onion/ Screen
Index of /
⬆️
2025-08-20
http://mvr2bidstp52pkaybzccjueux4hqbkukuqiss6vhn72qwqruzc7awsid.onion/ Screen
Index of /
⬆️
2025-08-20
http://vmnnrqf3gs3kl2kfnxatughwmnlyq6qxzyx24ylyh2w36vw3gqwqjpqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://ko3lwb6glib74kmol5ov5cphabwqmifb5lnjw4bvj75jpfigrfbn7gid.onion/ Screen
Index of /
⬆️
2025-08-20
http://wkqvktnmr2slazl76opbkdli4ia6gznhxln2z5wny54hf4kzjwgqvxyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://cjhuttkivmtrf6itrmyoqnxw55isy3dh6u5ifc3fnhajp7lwn5deflid.onion/ Screen
Index of /
⬆️
2025-08-20
http://3cxvgnwvbzzfm2abzxidi76uib53vsjudsavgzm4viaj26drkcdl6wad.onion/ Screen
Index of /
⬆️
2025-08-20
http://ab2v4xzffr24pdmswqzrbg45pwsget4h7eyd4swxewuqbxmlwcju7lad.onion/ Screen
Index of /
⬆️
2025-08-20
http://fk5c3gxraixjl3p7zacchn4jvew35vxo5xpedqf2qtlynsheqymampid.onion/ Screen
Index of /
⬆️
2025-08-20
http://yjsknaecbmhvrsagrcwqelpojnbcllt6v27vxebxhnotd3wu67onc5qd.onion/ Screen
Index of /
⬆️
2025-08-20
http://kxntyq6yyfomjoqqya6px7pgc6mbfcbaejryxhiwpntcnlr7hopqj3yd.onion/ Screen
⬇️
2025-08-11
http://2puszzzqvfv2eco7idbt2fznn2iwlsw27ns5xq3ad257mui2keakacqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://ebcbyeua65jtsnbsqsjahurkfj6yndhcwnnfxvwwg4yegb5h7fxjc5ad.onion/ Screen
Index of /
⬆️
2025-08-20
http://2lqlecl4q4hkrb3rl5p27b4hptnz7lqaaux5uca3g6pylpqlhqyafvad.onion/ Screen
Index of /
⬇️
2025-08-20
http://74fwiwaeqvtuf6uddankq5pzq637zpput3qxzq36fcxkhltq5plcxdqd.onion/ Screen

Krypt

Links

Page title Available Last visit URL Screen
Not Found - Krypt
⬆️
2025-08-20
http://decryptjhpol6zezc72xb2mofmi6o7xlvacnrpbuiczz2sz5ljurg4id.onion/chat Screen
Not Found - Krypt
⬆️
2025-08-20
http://decryptrrx2fojgfcof3aesrklj5obq7nmizyokq7ohzqxtwfcvtmwad.onion/chat Screen

Kryptina

Links

Page title Available Last visit URL Screen

Kuiper

Description

Kuiper is a relatively new ransomware strain first analyzed in April 2023, notable for being written in Rust and designed to target multiple platforms, including Windows, Linux, and ESXi environments. The ransomware encrypts files with ChaCha20 symmetric encryption, securing keys with Curve25519, and appends the .kuiper extension to affected files. Kuiper operates under a double-extortion model, exfiltrating data before encryption and threatening to leak it on a Tor-hosted site if the ransom is not paid. Initial infection vectors are not widely documented, but analysis suggests potential use of compromised credentials, phishing, or exploitation of exposed services. The ransomware contains evasion techniques such as process termination, shadow copy deletion, and targeting of backup files to hinder recovery. Public reporting on Kuiper remains limited, indicating it may be in an early operational stage or used by a small number of actors.

Links

Page title Available Last visit URL Screen

Kuza

Links

Page title Available Last visit URL Screen

La Piovra

parsing : enabled

Links

Page title Available Last visit URL Screen
La Piovra Ransomware
⬇️
2024-07-11
http://et22fibzuzfyzgurm35sttm52qbzvdgzy5qhzy46a3gmkrrht3lec5ad.onion/ Screen
La Piovra Ransomware – a new cartel
⬇️
2024-07-11
http://h3txev6jev7rcm6p2qkxn2vctybi4dvochr3inymzgif53n2j2oqviqd.onion/ Screen
La Piovra Ransomware - Members Only
⬇️
2024-07-11
http://wx3djgl4cacl6y4x7r4e4mbqrrub24ectue7ixyix2du25nfowtvfiyd.onion Screen

Lambda

Links

Page title Available Last visit URL Screen
Live Support
⬇️
2023-10-09
http://nn5ua7gc7jkllpoztymtfcu64yjm7znlsriq3a6v5kw7l6jvirnczyyd.onion Screen
None
⬇️
2021-05-01
http://krjv3wondknwdrlvzp6ktqcqkrlvpme2xjt3fu7ojqpaqgl3sm33bdqd.onion/

Lapsus$

Description

Lapsus$ is a cyber extortion group first observed in late 2021, known for high-profile breaches and data theft campaigns against major global companies rather than traditional ransomware encryption. The group primarily focuses on data exfiltration and public leak threats without encrypting victim systems. Lapsus$ uses a combination of social engineering, SIM swapping, MFA fatigue attacks, and purchasing access from insiders or access brokers to infiltrate corporate networks. Their victim list includes Microsoft, Okta, NVIDIA, Samsung, Uber, and telecom operators, with operations targeting multiple regions worldwide. Once inside, Lapsus$ actors exfiltrate source code, proprietary data, and customer information, often leaking samples to pressure victims into negotiation. The group is known for a brash and public-facing style, communicating directly with followers on Telegram channels and occasionally mocking victims. Several members, including minors, have been arrested in the UK, but the group’s activities have persisted in some form.

Links

Page title Available Last visit URL Screen
Telegram: Contact @minsaudebr
⬆️
2025-08-20
https://t.me/minsaudebr Screen

Late.Lol

Description

Affiliates: @Mr.C @Empathy @jayze @Widow @Memory

Links

Page title Available Last visit URL Screen
late.lol
⬆️
2025-08-20
https://late.lol Screen

Lcryptorx

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://lcryxdecryptor4f6xzyorj9qsb5e.onion
None
⬇️
Never
http://lcryptordecrypt7xfzq5tclm9jzpwq72uofgy2znkdsxm54zbcu2yid.onion

Leakeddata

parsing : enabled

Links

Page title Available Last visit URL Screen
LEAKED DATA
⬇️
2025-08-20
http://business-data-leaks.com Screen
Web Page Blocked
⬇️
2025-08-03
http://ep6pheij.com/ Screen

Leaknet

Description

In the cyber-undergrounds, we're exploring shadowed corridors of the digital world in search of inside information. we’re a digital watchdog operating at the intersection of cybersecurity, internet freedom, and investigative journalism. We delve into the hidden corners of the web, exposing truths and uncovering stories that are often buried by mainstream media or distorted by corporate interests. This project isn’t just for tech experts or privacy advocates. It’s for everyone who values transparency, freedom, and integrity in a connected world. Operating independently, we’re free from corporate influence and political bias, enabling us to report with uncompromising honesty. Our work resonates with a diverse audience cybersecurity experts, digital rights activists, journalists, and anyone who values an internet free from control. In a world where the lines between truth and agenda grow increasingly blurred, we’re building something bold, the space where the truth of the internet can be uncovered, untamed and unfiltered. Our project is an independent voice for digital freedom, committed to shining a light on the internet’s most vital and vulnerable spaces: cybersecurity, privacy, and the right to information without compromise. In a landscape clouded by agendas and profit, we are here to do one thing: deliver the truth, boldly and beautifully. Join us as we push back against the systems that seek to compromise our digital freedoms and carve a path toward a more transparent, liberated internet.

parsing : enabled

Links

Page title Available Last visit URL Screen
News Blog
⬆️
2025-08-20
http://nleakk6sejx45jxtk7x6iyt65hwvfrkifc5v7ertdlwm3gttbpvlvxqd.onion/ Screen
⬇️
Never
http://ahic5qo3qbjgsyv7x2h5w7uh6nuh45km5srblj7i2amxt57xp4wud2qd.onion/
⬆️
2025-08-20
http://bnlluetsuf6pv7mchgue46h43v66uxtccpg3n5vcdzbeqften5cedlid.onion/ Screen

Lilith

Description

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://yeuajcizwytgmrntijhxphs6wn5txp2prs6rpndafbsapek3zd4ubcid.onion/

Linkc

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Linkc Pub
⬇️
2025-04-26
http://iywqjjaf2zioehzzauys3sktbcdmuzm2fsjkqsblnm7dt6axjfpoxwid.onion/ Screen
⬇️
2025-04-26
http://xs4psqhvekjle3qwyiav7dzccuo4ylw2eylvd3peuqrld74kzzjzhcyd.onion/ Screen

Lockbit

Description

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://lockbitkodidilol.onion
⬇️
Never
http://lockbitks2tvnmwk.onion

Lockbit3

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Title
⬇️
2024-10-16
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion/ Screen
Start-maximized.com
⬇️
2022-07-13
http://zqaflhty5hyziovsxgqvj2mrz5e5rs6oqxzb54zolccfnvtn5w2johad.onion
Title
⬇️
2024-10-16
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion Screen
Title
⬇️
2024-10-16
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion Screen
Title
⬇️
2024-10-16
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion Screen
Title
⬇️
2024-10-16
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion Screen
LockBit BLOG
⬇️
2022-06-17
http://yq43odyrmzqvyezdindg2tokgogf3pn6bcdtvgczpz5a74tdxjbtk2yd.onion
LockBit Anti-DDos protection
⬇️
2022-06-17
http://oyarbnujct53bizjguvolxou3rmuda2vr72osyexngbdkhqebwrzsnad.onion
LockBit BLOG
⬇️
2022-06-17
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
It's better than Tinder!
⬇️
2022-08-06
http://lockbitapt.uz
LockBit BLOG
⬇️
2022-06-17
http://yq43odyrmzqvyezdindg2tokgogf3pn6bcdtvgczpz5a74tdxjbtk2yd.onion
LockBit BLOG
⬇️
2022-06-17
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
Title
⬇️
2024-10-16
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion Screen
Title
⬇️
2024-10-16
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion Screen
Title
⬇️
2024-10-16
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion Screen
Title
⬇️
2024-10-16
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion Screen
Title
⬇️
2024-10-16
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z2jwcskxpbokpemdxmltipntwlkmidcll2qirbu7ykg46eyd.onion Screen
LockBit LOGIN
⬇️
2024-02-19
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion Screen
LockBit BLOG
⬆️
2025-08-20
http://lockbit3753ekiocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2id.onion/ Screen
LockBit BLOG
⬇️
2025-08-19
http://lockbit3g3ohd3katajf6zaehxz4h4cnhmz5t735zpltywhwpc6oy3id.onion/ Screen
LockBit BLOG
⬆️
2025-08-20
http://lockbit3olp7oetlc4tl5zydnoluphh7fvdt5oa6arcp2757r7xkutid.onion Screen
LockBit BLOG
⬇️
2025-08-20
http://lockbit435xk3ki62yun7z5nhwz6jyjdp2c64j5vge536if2eny3gtid.onion Screen
LockBit BLOG
⬆️
2025-08-20
http://lockbit4lahhluquhoka3t4spqym2m3dhe66d6lr337glmnlgg2nndad.onion Screen
LockBit BLOG
⬆️
2025-08-20
http://lockbit6knrauo3qafoksvl742vieqbujxw7rd6ofzdtapjb4rrawqad.onion Screen
LockBit BLOG
⬇️
2025-08-19
http://lockbit7ouvrsdgtojeoj5hvu6bljqtghitekwpdy3b6y62ixtsu5jqd.onion Screen
504 Gateway Time-out
⬇️
2024-06-26
http://ofj3oaltwaf67qtd7oafk5r44upm6wkc2jurpsdyih2c7mbrbshuwayd.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbit23xxhej7swdop24cru7ks2w66pw7zgdkydqo6f7wfyfqo7oqd.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbit7ixelt7gn3ynrs3dgqtsom6x6sd2ope4di7bu6e6exyhazeyd.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitck6escin3p33v3f5uef3mr5fx335oyqon2uqoyxuraieuhiqd.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitfhzimjqx2v7p2vfu57fpdm5zh2vsbfk5jkjod3k5pszbek7ad.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbiti7ss2wzyizvyr2x46krnezl4xjeianvupnvazhbqtz32auqqd.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitkwkmhfb2zr3ngduaa6sd6munslzkbtqhn5ifmwqml4sl7znad.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitqfj7mmhrfa7lznj47ogknqanskj7hyk2vistn2ju5ufrhbpyd.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z2mmiz3ryxafn5kapbvbbiywsxwovasfkgf5dqqp5kxlajad.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z2og4jlsmdy7dzty3g42eu3gh2sx2b6ywtvhrjtss7li4fyd.onion Screen
LockBit - Leaked
⬇️
2025-08-20
http://lockbit7z355oalq4hiy5p7de64l6rsqutwlvydqje56uvevcc57r6qd.onion Screen
LockBit - Leaked
⬆️
2025-08-20
http://lockbit7z36ynytxwjzuoao46ck7b3753gpedary3qvuizn3iczhe4id.onion Screen
LockBit - Leaked
⬆️
2025-08-20
http://lockbit7z37ntefjdbjextn6tmdkry4j546ejnru5cejeguitiopvhad.onion Screen
LockBit - Leaked
⬇️
2025-08-18
http://lockbit7z3azdoxdpqxzliszutufbc2fldagztdu47xyucp25p4xtqad.onion Screen
LockBit - Leaked
⬆️
2025-08-20
http://lockbit7z3ddvg5vuez2vznt73ljqgwx5tnuqaa2ye7lns742yiv2zyd.onion Screen
LockBit - Leaked
⬆️
2025-08-20
http://lockbit7z3hv7ev5knxbrhsvv2mmu2rddwqizdz4vwfvxt5izrq6zqqd.onion Screen
⬇️
Never
http://ockbit7z3ujnkhxwahhjduh5me2updvzxewhhc5qvk2snxezoi5drad.onion
LockBit - Leaked
⬆️
2025-08-20
http://lockbit7z4bsm63m3dagp5xglyacr4z4bwytkvkkwtn6enmuo5fi5iyd.onion Screen
LockBit - Leaked
⬇️
2025-08-18
http://lockbit7z4cgxvictidwfxpuiov4scdw34nxotmbdjyxpkvkg34mykyd.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z4k5zer5fbqi2vdq5sx2vuggatwyqvoodrkhubxftyrvncid.onion Screen
LockBit - Leaked
⬇️
2025-08-18
http://lockbit7z4ndl6thsct34yd47jrzdkpnfg3acfvpacuccb45pnars2ad.onion Screen
LockBit - Leaked
⬇️
2025-08-20
http://lockbit7z55tuwaflw2c7torcryobdvhkcgvivhflyndyvcrexafssad.onion Screen
LockBit - Leaked
⬇️
2025-08-20
http://lockbit7z57mkicfkuq44j6yrpu5finwvjllczkkp2uvdedsdonjztyd.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z5ehshj6gzpetw5kso3onts6ty7wrnneya5u4aj3vzkeoaqd.onion Screen
LockBit - Leaked
⬆️
2025-08-20
http://lockbit7z5hwf6ywfuzipoa42tjlmal3x5suuccngsamsgklww2xgyqd.onion Screen
LockBit - Leaked
⬇️
2025-08-18
http://lockbit7z5ltrhzv46lsg447o3cx2637dloc3qt4ugd3gr2xdkkkeayd.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z6choojah4ipvdpzzfzxxchjbecnmtn4povk6ifdvx2dpnid.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z6dqziutocr43onmvpth32njp4abfocfauk2belljjpobxyd.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z6f3gu6rjvrysn5gjbsqj3hk3bvsg64ns6pjldqr2xhvhsyd.onion Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z6qinyhhmibvycu5kwmcvgrbpvtztkvvmdce5zwtucaeyrqd.onion Screen
LockBit - Leaked
⬇️
2025-08-17
http://lockbit7z6rzyojiye437jp744d4uwtff7aq7df7gh2jvwqtv525c4yd.onion Screen
⬇️
2025-07-07
http://lockbit5eevg7vec4vwwtzgkl4kulap6oxbic2ye4mnmlq6njnpc47qd.onion Screen
⬇️
2025-07-07
http://lockbit74beza5z3e3so7qmjnvlgoemscp7wtp33xo7xv7f7xtlqbkqd.onion Screen
⬇️
2025-07-07
http://lockbit75naln4yj44rg6ez6vjmdcrt7up4kxmmmuvilcg4ak3zihxid.onion Screen
⬇️
2025-07-07
http://lockbit7a2g6ve7etbcy6iyizjnuleffz4szgmxaawcbfauluavi5jqd.onion Screen
⬇️
2025-07-07
http://lockbitaa46gwjck2xzmi2xops6x4x3aqn6ez7yntitero2k7ae6yoyd.onion Screen
⬇️
2025-07-07
http://lockbitb42tkml3ipianjbs6e33vhcshb7oxm2stubfvdzn3y2yqgbad.onion Screen
⬇️
2025-07-07
http://lockbitcuo23q7qrymbk6dsp2sadltspjvjxgcyp4elbnbr6tcnwq7qd.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitffcjqi2wpwhjgubkjihhc7seaujqgzscvwvdiftunl6hn5oyd.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitehorki5kh6s3n27hi3serhzr7htlshfqyg5ex32dyr5efhfyd.onion Screen
Humanity check
⬇️
2024-12-02
http://lockbitdzjxsgyacnmfte6nfgqfcyhedkduimi4tsajvrwi4ljbos7id.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitdzjxsgyacnmfte6nfgqfcyhedkduimi4tsajvrwi4ljbos7id.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitbtdk33k75rsl6uhn6bewd5g6z3hp42z6vb2hfk54oja55h7id.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbitb63zs7f4rdjcsn2etkqaswurk6hh55sa2ojeilxcnwf6qbkqd.onion Screen
⬇️
Never
http://lockbit7xn7nqc5f5gfhv6qrf46xh65lscuzctwnmomthcigu2m3tad.onion
Humanity check
⬇️
2025-07-07
http://lockbit7bb4b6n27feok2rc7ri75udaqkfppjvtkxlwh7qldygbopmad.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbit4r3ly63w22jhkg33emtqwxw436wkftosscvdal2prdlwzknyd.onion Screen
Humanity check
⬇️
2025-07-07
http://lockbit3hdu7e4sv3ecg6mmqmeihjcizebcxic6t4eqwar6f2e7rxpad.onion Screen
⬆️
2025-08-20
http://lockbit3753ekiocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2id.onion/pgp.txt Screen
Humanity check
⬇️
2024-09-30
http://lbb47q2f7nzeatj6mxppuk7bhnvwu23mf6pfuywxcz57dwnzl6z3ksqd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbb6ud2vyf23z4hw6fzskr5gru7eftbjfbd6yzra3hzuqqvjy63blqqd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbb2llze7ab4rnq4jumsy4ihsqzpuysaofpz2e43foocwmrzsokumqid.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbb5cnqexve2wg6acbfyohkzeijflpqmgijx5ksyvu4aljv27r2lgiid.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbchnkrhkjtltjunmqsbw32bbblsd5bd2pqywtt2bex4bjmo5ry2iqd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbellr6aq4kuchzy44pmimszfd4di4fslez765ux4kse3o4lxcnpgid.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbuxq57hyskobn5xwtw26rkq4wyvttory6k7pio2lv5adeopeezv6ad.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbvhambmct5s4rpf2b65mrnqynhpn4hksq47io2wow5cjtv3xmsypid.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbw6uqp2te2f323ltn2fgwl5tu5cr3udoj3ik2obdtr5367skuh4cid.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbw7j6si6k2bzxd4tzvesoijfjtr4pa6awqie63rmkpql7hmu6tqnqd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbxv6nlojheut6th4nqwpabr4gtksm7y7f4c52ubvvvumydpo4dmryd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbzlychkbilhjsw5hhuvk7zk4axdffy3nvel3zaqwnuo2d4nlqqkeyd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbzme4ctvcgzo5lq7jvcdy2v2cs6hrlgihsmylfddprzqptm6ywhhyd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbfsazjqqwvtq2ckhm53kfmvsy7c6sdci3uy6qui4lv66aeef7hhpad.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbgv7wsi6bpguvjbu6omdgwzllqm5tvdo65do2q7vw4er7aqrnjmtad.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbjmbkvw3yurmnazwkbj5muyvw5dd6y7hyxrus23y33qiqczclrnbyd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbpoq6d2jglpw7dxarr6oaakgnlxt5nmrza5ojlufsuffuzexajsuyd.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbp2rsfcmg5durpwgs22wxrdngsa4wiwmc4xk6hgmuluy6bvbvvtlid.onion/ Screen
Humanity check
⬇️
2024-09-30
http://lbbov7weoojwnqytnjqygmglkwtim5dvyw3xvoluk5ostz75ofd6enqd.onion/ Screen
Title
⬇️
2024-10-16
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion/ec_page3.php Screen
LockBit - Leaked
⬆️
2025-08-20
http://lockbitfnszjao7hayqsd424m74k5jxc52hozvabjrut7pjfsfaaaoad.onion Screen
⬇️
Never
http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion/
⬇️
Never
http://lockbitsupdwon76nzykzblcplixwts4n4zoecugz2bxabtapqvmzqqd.onion/
⬇️
Never
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion/
⬇️
Never
http://lockbitsupo7vv5vcl3jxpsdviopwvasljqcstym6efhh6oze7c6xjad.onion/
⬇️
Never
http://lockbitsupq3g62dni2f36snrdb4n5qzqvovbtkt5xffw3draxk6gwqd.onion/
⬇️
Never
http://lockbitsupqfyacidr6upt6nhhyipujvaablubuevxj6xy3frthvr3yd.onion/
⬇️
Never
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion/
⬇️
Never
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion/
⬇️
Never
http://lockbitsupxcjntihbmat4rrh7ktowips2qzywh6zer5r3xafhviyhqd.onion/
⬇️
Never
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/
⬇️
Never
http://lockbitfshjx7xrlafzhohinfu3theolrjakrlxoduwk65d755yahuqd.onion/
⬇️
Never
http://lockbitfsnvvv5dbubfbhb4qo23olw5n3a2pqs72p3yh2g6prkxrhvad.onion/
⬇️
Never
http://lockbitfsxt2gdyz72harnb7qa5qa6sf73bvy7wz65fuiw7vlxarujid.onion/
LockBit Private Note
⬇️
2025-08-20
http://lockbitpn4nmflibn4cooh4sydie6bpoy33tbxa3rjebryxc5vblkwyd.onion/ Screen
LockBit Private Note
⬇️
2025-08-20
http://lockbitpn7doehfdzu3r2orcibdx6njq62aavkr4hgh3p6rednr5gfad.onion/ Screen
LockBit Private Note
⬆️
2025-08-20
http://lockbitpntsng25yxacx5jqdccvoqd5qtyzzximljfskvtk6ektjhvad.onion/ Screen
⬇️
2024-12-18
http:// lockbit7ixelt7gn3ynrs3dgqtsom6x6sd2ope4di7bu6e6exyhazeyd.onion/
Humanity check
⬇️
2025-07-07
http://lockbit7xn7nqc5f5gfhv6qrf46xlh65lscuzctwnmomthcigu2m3tad.onion/ Screen
Humanity check
⬇️
2025-07-07
http://lockbitbvcwegcbou4fulv3iy3bpwh2do3y243w2riwbgcdpl3hd3uyd.onion/ Screen
LockBit - Leaked
⬇️
2025-08-19
http://lockbit7z3ujnkhxwahhjduh5me2updvzxewhhc5qvk2snxezoi5drad.onion/ Screen
LockBit LOGIN
⬆️
2025-08-20
http://lockbitsptqsmaf56cmo7bieqwh5htlsfkodpahsaurxlquoz67zwrad.onion/ Screen
LockBit File Share
⬇️
2025-08-20
http://lockbitfsvf75glg226he5inkfgtuoakt4vgfhd7nfgghx5kwz5zo3ad.onion/ Screen
LockBit File Share
⬆️
2025-08-20
http://lockbitfskq2fxclyfrop5yizyxpzu65w7pphsgthawcyb4gd27x62id.onion/ Screen
LockBit File Share
⬇️
2025-08-20
http://lockbitfss2w7co3ij6am6wox4xcurtgwukunx3yubcoe5cbxiqakxqd.onion/ Screen

Lockbit4

Description

Links

Page title Available Last visit URL Screen
LockBit Tech Works
⬆️
2025-08-20
http://lockbitapyx2kr5b7ma7qn6ziwqgbrij2czhcbojuxmgnwpkgv2yx2yd.onion/ Screen
LockBit Tech Works
⬇️
2025-06-03
http://lockbitapyum2wks2lbcnrovcgxj7ne3ua7hhcmshh3s3ajtpookohqd.onion/ Screen
LockBit Tech Works
⬇️
2025-08-20
http://lockbitapp24bvbi43n3qmtfcasf2veaeagjxatgbwtxnsh5w32mljad.onion/ Screen
LockBit Tech Works
⬆️
2025-08-20
http://lockbitapo3wkqddx2ka7t45hejurybzzjpos4cpeliudgv35kkizrid.onion/ Screen
LockBit Tech Works
⬆️
2025-08-20
http://lockbitapiahy43zttdhslabjvx4q6k24xx7r33qtcvwqehmnnqxy3yd.onion/ Screen

Lockdata

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://wm6mbuzipviusuc42kcggzkdpbhuv45sn7olyamy6mcqqked3waslbqd.onion

Lockergoga

Links

Page title Available Last visit URL Screen

Locky

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://6dtxgqam4crv6rr6.onion/
None
⬇️
Never
http://i3ezlvkoi7fwyood.onion

Locus

Links

Page title Available Last visit URL Screen
Welcome to nginx!
⬇️
2025-07-20
http://ugn5khvt4kitlivv4ddfh3lb6mdhn2ud3ximcaypy73hxlk3arj2goad.onion/ Screen

Lokilocker

Links

Page title Available Last visit URL Screen

Lolnek

Description

Links

Page title Available Last visit URL Screen
⬇️
2022-08-27
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion Screen
⬇️
2023-05-11
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion Screen
⬇️
2022-10-01
http://nclen75pwlgebpxpsqhlcnxsmdvpyrr7ogz36ehhatfmkvakeyden6ad.onion Screen
404 Not Found
⬇️
2024-04-21
http://mmcbkgua72og66w4jz3qcxkkhefax754pg6iknmtfujvkt2j65ffraad.onion/ Screen
None
⬇️
Never
http://tzw7ckhurmxgcpajx6gy57dkrysl2sigfrt6nk4a3rvedfldigtor7ad.onion
None
⬇️
Never
http://34vm2smykaqtzzzm4bgycfzg5fwyhhksrkpahdbiswmmuwuu7hmvuvqd.onion
None
⬇️
Never
http://u2kqti2utfaiefucegnmd6yh6hledbsfanaehhnnn3q5usk6bvndahqd.onion
None
⬇️
Never
http://mrv44idagzu47oktcipn6tlll6nzapi6pk3u7ehsucl4hpxon45dl4yd.onion

Lorenz

Description

Tesorion describes Lorenz as a ransomware with design and implementation flaws, leading to impossible decryption with tools provided by the attackers. A free decryptor for 2021 versions was made available via the NoMoreRansom initiative. A new version of the malware was discovered in March 2022, for which again was provided a free decryptor, while the ransomware operators are not able to provide tools to decrypt affected files.

parsing : enabled

Links

Page title Available Last visit URL Screen
Lorenz
⬇️
2024-08-14
http://lorenzmlwpzgxq736jzseuterytjueszsvznuibanxomlpkyxk6ksoyd.onion/ Screen
None
⬇️
Never
http://woe2suafeg6ehxivgvvn4nh6ectbdhdqgc4vzph27mmyn7rjf2c52jid.onion
None
⬇️
Never
http://lorenzedzyzyjhzxvlcv347n5piltxamo755pzqpozh5l47kj7mxueid.onion/
None
⬇️
Never
http://lorenzezzwvtk3y24wfph4jpho27grrctqvf6yvld7256rnoz7yg2eid.onion/

Losttrust

parsing : enabled

Links

Page title Available Last visit URL Screen
LostTrust home
⬇️
2023-11-02
http://hscr6cjzhgoybibuzn2xud7u4crehuoo4ykw3swut7m7irde74hdfzyd.onion/ Screen

Luckbit

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://luckbit53sdne5yd5vdekadhwnbzjyqlbjkc4g33hs6faphfkvivaeid.onion/

Lulzsec Muslims

Links

Page title Available Last visit URL Screen
⬇️
2025-06-04
http://dfi7ynmrugokn4fgvpbz5unt4d6k2i5abyez7wnoxxa2ifaw6s5puzqd.onion/ Screen
Chat-room
⬇️
2025-06-04
http://dfi7ynmrugokn4fgvpbz5unt4d6k2i5abyez7wnoxxa2ifaw6s5puzqd.onion/TOPDz/data/ Screen

Lv

Description

parser needs to be built

parsing : enabled

Links

Page title Available Last visit URL Screen
LV Blog
⬇️
2022-12-20
http://rbvuetuneohce3ouxjlbxtimyyxokb4btncxjbo44fbgxqy7tskinwad.onion/ Screen
Start-maximized.com
⬇️
2022-03-19
http://4qbxi3i2oqmyzxsjg4fwe4aly3xkped52gq5orp6efpkeskvchqe27id.onion/
None
⬇️
Never
http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion/

Lynx

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Lynx
⬇️
2025-05-26
http://lynxblog.net/ Screen
Lynx
⬇️
2024-08-03
http://lynxbllrfr5262yvbgtqoyq76s7mpztcqkv6tjjxgpilpma7nyoeohyd.onion/leaks Screen
Lynx
⬇️
2025-05-09
http://lynxch2k5xi35j7hlbmwl7d6u2oz4vp2wqp6qkwol624cod3d6iqiyqd.onion/login Screen
Lynx
⬇️
2025-05-26
http://lynxblog.net/leaks Screen
Lynx
⬇️
2025-08-20
http://lynxchatly4zludmhmi75jrwhycnoqvkxb4prohxmyzf4euf5gjxroad.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxchatohmppv6au67lloc2vs6chy7nya7dsu2hhs55mcjxp2joglad.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxchatbykq2vycvyrtjqb3yuj4ze2wvdubzr2u6b632trwvdbsgmyd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxchatde4spv5x6xlwxf47jdo7wtwwgikdoeroxamphu3e7xx5doqd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxchatdy3tgcuijsqofhssopcepirjfq2f4pvb5qd4un4dhqyxswqd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxchatdykpoelffqlvcbtry6o7gxk3rs2aiagh7ddz5yfttd6quxqd.onion/login Screen
Lynx
⬇️
2025-07-09
http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks Screen
Lynx
⬆️
2025-08-20
http://lynxblogco7r37jt7p5wrmfxzqze7ghxw6rihzkqc455qluacwotciyd.onion/leaks Screen
Lynx
⬆️
2025-08-20
http://lynxblogijy4jfoblgix2klxmkbgee4leoeuge7qt4fpfkj4zbi2sjyd.onion/leaks Screen
Lynx
⬆️
2025-08-20
http://lynxblogmx3rbiwg3rpj4nds25hjsnrwkpxt5gaznetfikz4gz2csyad.onion/leaks Screen
Lynx
⬆️
2025-08-20
http://lynxblogoxllth4b46cfwlop5pfj4s7dyv37yuy7qn2ftan6gd72hsad.onion/leaks Screen
Lynx
⬆️
2025-08-20
http://lynxblogtwatfsrwj3oatpejwxk5bngqcd5f7s26iskagfu7ouaomjad.onion/leaks Screen
Lynx
⬆️
2025-08-20
http://lynxblogxutufossaeawlij3j3uikaloll5ko6grzhkwdclrjngrfoid.onion/leaks Screen
⬇️
2025-05-16
http://lynxstorage1.net/ Screen
Lynx
⬆️
2025-08-20
http://lynxchatfw4rgsclp4567i4llkqjr2kltaumwwobxdik3qa2oorrknad.onion/ Screen
⬇️
Never
http://lynxba5y5juv3c4de2bftamjkbxvcuujr5c5wn4hq2fwmt66pxb7qqad.onion
Lynx
⬇️
2025-05-15
http://lynxchat.net Screen
⬆️
2025-08-20
http://lynxcdnjg43re373nltauhdqfbau25mwawsg42h4lswfe455uaznilad.onion/ Screen
Lynx
⬆️
2025-08-20
http://lynxad2seqpyu52lr5v7il4idasv23535a46s4bj65b3v7t5y6u5daqd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynx2m7xz73zpmlm5nddbokk6a55fh2nzjq2r5nk2hbdbk74iddqfiqd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxcwuhva6qzlnj3m3qrcl6bgvnxpixg5vsikf53vutdf3ijuv2pxyd.onion/login Screen
Lynx
⬇️
2025-08-20
http://lynxcyys7c2np3b3er2wo6sufwoonmh6i3nykv53pst336c3ml4ycjqd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxdehvlvrrtnhtpuy6bhrxffzvl5j7y7p3zl553slzq44lcb2jzkyd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxikczcyposxfz5a7hxbqxilsrtx7zdzwmhk5wcb5qoatbv2suizid.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxroggpujfxy7xnlrz3yknphqgk4k5dy4rhaldgz2hpxyyy3ncuvad.onion/login Screen
Lynx
⬇️
2025-08-20
http://lynxoifh5boac42m6xdoak6ne7q53sz7kgaaze7ush72uuetbnjg2oqd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynx25vsi4cxesh44chevu2qyguqcx4zrjsjd77cjrmbgn75xkv626yd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxaeddweqscykez5rknrug6ui5znq4yoxof5qnusiatiyuqqlwhead.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxbk3nzrnph5z5tilsn3twfcgltqynaofuxgb5yt43vdu266z3vvyd.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxhwtifuwxs2zejofpagvzxf7p2l3nhdi3zlrap3y2wsn5hqyfeuid.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxjamasdeyeeiusfgfipfivewc3l3u34hyiiguhdyj776mh535l4ad.onion/login Screen
Lynx
⬆️
2025-08-20
http://lynxk7rmhe7luff3ed7chlziwrju34pzc5hm452xhryeaeulc3wxc3ad.onion/login Screen
⬆️
2025-08-20
http://lynxcdn6yh5inxdqregzgm674qlbwzrmvozmejuercv2zq3nlugifoad.onion/ Screen

Lyrix

Links

Page title Available Last visit URL Screen

Mad Liberator

Description

Group is also currently known as MADDLL32 and Metatron.

parsing : enabled

Links

Page title Available Last visit URL Screen
MADDLL32 - LEAKED FILES
⬇️
2024-10-03
http://k67ivvik3dikqi4gy4ua7xa6idijl4si7k5ad5lotbaeirfcsx4sgbid.onion Screen

Mailto

Links

Page title Available Last visit URL Screen

Makop

Links

Page title Available Last visit URL Screen

Malas

parsing : enabled

Links

Page title Available Last visit URL Screen
Posts | Somos malas... podemos ser peores
⬆️
2025-08-20
http://malas2urovbyyavjzaezkt5ohljvyd5lt7vv7mnsgbf2y4bwlh72doqd.onion/posts/ Screen
⬆️
2025-08-20
http://malas2urovbyyavjzaezkt5ohljvyd5lt7vv7mnsgbf2y4bwlh72doqd.onion/atom.xml Screen

Malek Team

parsing : enabled

Links

Page title Available Last visit URL Screen
Just a moment...
⬇️
2024-11-10
https://malekteam.ac Screen
Malek Team
⬇️
2025-05-06
http://195.14.123.2/ Screen

Mallox

parsing : enabled

Links

Page title Available Last visit URL Screen
Mallox | Data Leaks
⬇️
2025-01-21
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion Screen
None
⬇️
Never
http://wtyafjyizleuw4yhepmdsrcfjwmtiysunos6ixchw3r5d7eeimw2rrid.onion
Mallox | Sign in
⬇️
2025-01-21
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin Screen

Malphas

Description

Links

Page title Available Last visit URL Screen

Mamona

Description

Links

Page title Available Last visit URL Screen
DragonForce | Oops...
⬇️
2025-03-19
http://owt3kwkxod2pvxlv3uljzskfhebhrhoedrh5gqrxyyd6rrco4frzj5ad.onion/ Screen
⬇️
2025-03-19
http://185.158.113.114:5000/affiliate/login Screen
⬇️
2025-03-19
http://185.158.113.114:5000/admin/login Screen
None
⬇️
Never
http://bdhjur3agrogoxvwobbzpptkxhyewnjrhzqj4ug2dyfhf3dopyvvurid.onion/

Mario Esxi

Links

Page title Available Last visit URL Screen

Maze

Description

Maze Ransomware encrypts files and makes them inaccessible while adding a custom extension containing part of the ID of the victim. The ransom note is placed inside a text file and an htm file. There are a few different extensions appended to files which are randomly generated. Actors are known to exfiltrate the data from the network for further extortion. It spreads mainly using email spam and various exploit kits (Spelevo, Fallout). The code of Maze ransomware is highly complicated and obfuscated, which helps to evade security solutions using signature-based detections.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://xfr3txoorcyy7tikjgj5dk3rvo3vsrpyaxnclyohkbfp3h277ap4tiad.onion
None
⬇️
Never
http://aoacugmutagkwctu.onion/
⬆️
2025-08-20
https://mazedecrypt.top/ Screen
None
⬇️
Never
http://dnspexdevfbct2agyu3oxrmhm4ggf4ec6iwpnlb3kwb2rigrtuz3sayd.onion/
None
⬇️
Never
http://xjypo5vzgmo7jca6b322dnqbsdnp3amd24ybx26x5nxbusccjkm4pwid.onion/
None
⬇️
Never
http://Newsmaze.top
None
⬇️
Never
http://mazenews.top

Mbc

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://xembshruusobgbvxg4tcjs3jpdnks6xrr6nbokfxadcnlc53yxir22ad.onion

Mcafee

Links

Page title Available Last visit URL Screen

Mcrypt2019

Links

Page title Available Last visit URL Screen

Medusa

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Human Verify
⬇️
2024-03-01
http://medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion Screen
Human Verify
⬆️
2025-08-20
http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion Screen
503 Service Temporarily Unavailable
⬇️
2024-06-03
http://dlmfciajg5s4vliyo5dhs5jyzhi2xr2fnkebul46lpf4xudtqiue4nid.onion/ Screen
Human Verify
⬇️
2024-07-30
http://kyfiw76eol6ph2mq7pi5e5tdvce37bicddhai62qhdc5ja6jdchz4qqd.onion/ Screen
Human Verify
⬇️
2024-07-15
http://62foekhv5humjrfwjdyd2dgextpbf5i7obguhwvfoghmu3nxpkmxlcid.onion/ Screen
Human Verify
⬆️
2025-08-20
http://cx5u7zxbvrfyoj6ughw76oa264ucuuizmmzypwum6ear7pct4yc723qd.onion Screen
Human Verify
⬇️
2024-06-13
http://hupxs7ps7md24kpz4lwsbra64abgxjx3pcc2wuca5ibawf2g5hlpfyqd.onion Screen
osintcorp.net | 520: Web server is returning an unknown error
⬆️
2025-08-20
http://osintcorp.net Screen
Medusa Chat
⬆️
2025-08-20
http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/ Screen
Medusa Chat
⬇️
2025-01-19
http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/ Screen
⬇️
Never
http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion
Human Verify
⬇️
2025-08-20
http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion Screen
⬇️
Never
http://medusakxxtp3uo7vusntvubnytaph4d3amxivbgg13hnhpk2nmus34yd.onion/227098164ef1fdb119ef537986bbdf24
504 Gateway Time-out
⬇️
2025-02-13
http://hm2hlugduzuxiya5bgrsewfxmrzxbmslvg3t42zdzsorcn2nyfbrh6qd.onion/ Screen
Human Verify
⬇️
2025-08-20
http://7aqabivkwmpvjkyefonf3gpy5gsubopqni7kcirsrq3pflckxq5zz4id.onion/ Screen
None
⬇️
Never
http://762a33bcwneu3i6m7g4unj7xoyvl3nolnbeqhm4jfap6d7uczj43mrqd.onion
None
⬇️
Never
http://x4tqo27mrr5q5wobpuvw6rowmbclwe5h62etslydc6wnona73pmqwaid.onion

Megacortex

Links

Page title Available Last visit URL Screen

Megazord

Links

Page title Available Last visit URL Screen

Meow

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
MEOW
⬇️
2024-11-26
http://meow6xanhzfci2gbkn3lmbqq7xjjufskkdfocqdngt3ltvzgqpsg5mid.onion/ Screen
None
⬇️
Never
http://totos7fquprkecvcsl2jwy72v32glgkp2ejeqlnx5ynnxvbebgnletqd.onion
None
⬇️
Never
http://ikjht3url3tvx6itf2eghtrmwlmjfywz63ymnxghwwyhflcxnqffhvid.onion
None
⬇️
Never
http://mops6j3iuepvarl7ackf2itjkt4in3xkcbupnhy656byx6m6hnxkbgid.onion
None
⬇️
Never
http://meowthxcf4tm3rujk4bsjaoxd2ghmjx7vi342hz6zdu3lfyeykmc4wqd.onion

Mespinoza

Links

Page title Available Last visit URL Screen

Metaencryptor

Description

We are a group of young people who identify themselves as specialists in the field of network security with at least 15 years of experience. This blog and this work are ONLY commercial use, besides not the main one. We have nothing to do with politics, intelligence agencies and the NSB. If you are a hunter of other people's data, then download any files and (or) wait until the time expires for others and the files will be available here. If you have any personal suggestions, we are ready to consider them. Contact us on the "contacts" page. There are a lot of other data, for various reasons, not posted here and we can discuss their sale or transfer under certain conditions. Also, every incident is notified to all possible press in the region and data not intended for sale is transmitted to breached and similar forums. Subscribe to RSS, add to favorites, visit us more often.

parsing : enabled

Links

Page title Available Last visit URL Screen
Metaencryptor::Home
⬇️
2025-07-20
http://metacrptmytukkj7ajwjovdpjqzd7esg5v3sg344uzhigagpezcqlpyd.onion/ Screen
Metaencryptor::Home
⬇️
2025-07-20
https://metacrpttdfpbm4qoxzcrqqgr6e6zafpazgxm72knmujw2mwvi34rwad.onion Screen

Midas

Description

This malware written in C# is a variant of the Thanos ransomware family and emerged in October 2021 and is obfuscated using SmartAssembly. In 2022, ThreatLabz analysed a report of Midas ransomware was slowly deployed over a two month period (ZScaler). This ransomware features also its own data leak site as part of its double extortion strategy.

Links

Page title Available Last visit URL Screen
Info
⬇️
2022-04-15
http://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad.onion/blog.php

Miliphen

Links

Page title Available Last visit URL Screen

Mimic

Links

Page title Available Last visit URL Screen

Mimic-Guram

Description

Mimic v.10 Ransomware-as-a-Service (RaaS). The malware is designed to target various operating systems (Windows, ESXi, NAS, FreeBSD) and features network-wide deployment, file obfuscation, backup destruction, UAC bypass, and multithreaded encryption. The service offers additional tools like NTLM password decryption and call-based extortion. They prohibit attacks on CIS countries and require active participation, with decryption tools available for a fee currently 800USD.

Links

Page title Available Last visit URL Screen

Mindware

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://dfpc7yvle5kxmgg6sbcp5ytggy3oeob676bjgwcwhyr2pwcrmbvoilqd.onion/

Mogilevich

parsing : enabled

Links

Page title Available Last visit URL Screen
Mogilevich | Blog | Home
⬇️
2024-03-03
http://dkgn45pinr7nwvdaehemcrpgcjqf4fooit3c4gjw6dhzrp443ctvnoad.onion Screen
Mogilevich | Blog | Leaks
⬇️
2024-03-03
http://dkgn45pinr7nwvdaehemcrpgcjqf4fooit3c4gjw6dhzrp443ctvnoad.onion/leaks.html Screen

Moisha

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://moishddxqnpdxpababec6exozpl2yr7idfhdldiz5525ao25bmasxhid.onion

Money Message

parsing : enabled

Links

Page title Available Last visit URL Screen
News
⬆️
2025-08-20
http://blogvl7tjyjvsfthobttze52w36wwiz34hrfcmorgvdzb6hikucb7aqd.onion Screen
None
⬇️
Never
http://clientcuworpelkdwecucgvfhp5uz5n7uohsnokndrlhm2zkntyg3had.onion/
The Egyptian Tax Authority (ETA)
⬆️
2025-08-20
http://6xkylzxoxpd6bnl5ymhr6hysaoe3bsxzxhxpydhv22fmnt6m5zrlpvad.onion/ Screen
First Baptist Medical Center
⬆️
2025-08-20
http://l7eupjzxzfbsw7nxu7wu7lj2lzr5ulmyuyd4neyasbdmvzcedal7mmid.onion/ Screen
Insurance Agency Marketing Services
⬆️
2025-08-20
http://qyk5o7wcgocwebnymjusnc7siyetwl7po26flw4e6hhg2xiue7brvmid.onion/ Screen
Anna Jaques Hospital
⬆️
2025-08-20
http://bolfkdkjbdig64ieqixpyhmquuadkm6nzohutbkfwgzftd35kipy45ad.onion/ Screen
Tri-Way Manufacturing Technologies
⬆️
2025-08-20
http://742srdwxlwiu75kr3sbf6kzwjcxjwezvpi3s76ignhes3vqacvh3e4ad.onion/ Screen
Toscana Promozione
⬆️
2025-08-20
http://nhdmgcysxuvvmd4dqwqisxumirvcj6xfhahuds5z7qgj7qlr3i73nnqd.onion/ Screen
Maxco Supply
⬆️
2025-08-20
http://jioj2j5k53vrhtdgvjmeijgkdxgwadzjacywnybjvqftbkqpt3oy6cid.onion/ Screen
MD LOGISTICS
⬇️
2025-08-20
http://372bkntomuk4xmevyki2gvpzdsm77xkhp4z6sctugcogqwgpqj4xkjyd.onion/ Screen
Taylor University
⬆️
2025-08-20
http://vycmr2wn5nqhkpla62mqe4vxh4fgdbc5id4g6piy4mvbjnb4mp4t25yd.onion/ Screen
Riverside Logistics
⬆️
2025-08-20
http://jg7qeqdbqqordr5tazw5zc7s2h4sk2pt2hx4cxycqrcwr7vtpmreshad.onion/ Screen
Aiphone
⬆️
2025-08-20
http://lhzaw2b2xn6lmtoioiswufyvjnrghlkmhtvwgsrsjnnmj2ceu56popqd.onion/ Screen
Estes Design & Manufacturing
⬆️
2025-08-20
http://d2vda7sp7rxuizyduwvnvccs3giddkwgglj5ecgrmdpu32grp2txjeqd.onion/ Screen
None
⬇️
Never
http://26kbddrpm2xfjg4unow76xyvrffwh4usqjhsqgalf4h3diiujy75ngqd.onion/
None
⬇️
Never
http://moze6ryu3ev65tgmssb4sckagkgfzmjtsxg2d6xrjjua2dke5lagcxqd.onion/
None
⬇️
Never
http://au6l74lej2qvwrvasdyc5ta4g7jdshjwkzbi635g6uztld2n2fcacyad.onion/
None
⬇️
Never
http://wzu6yixpcohxeeunakzqf42dothwikt3gvtovamxdm6rfl3oe6smywyd.onion/
None
⬇️
Never
http://p6kxp556kkcbjdjsg24g3edmvr7v7ujecuychw4ibvqhl6wuomnrgbqd.onion/
None
⬇️
Never
http://z46mj5ihckzwf2ons46ceryjwyxt3ctrqyglmre5uhnipvoepaciulid.onion/
None
⬇️
Never
http://vkge4tbgo3kfc6n5lgjyvb7abjxp7wdnaumkh6xscyj4dceifieunkad.onion/
None
⬇️
Never
http://3w3uuz4vze6wdwxrebn3oaavft47xtvghl7qcmpqclgojr44muaigwyd.onion/
None
⬇️
Never
http://client372kkzvqpgniqp6r5rqkg22yrlhstxiaxskeowp2hrperdelad.onion
National Atomic Energy Commission
⬆️
2025-08-20
http://xq5t7xwptmpoxzjkns7wfbbr43zxedm6ygbfsh6bp6lipvyhzkfopjyd.onion/ Screen
Kazyon
⬆️
2025-08-20
http://pdndkkg2hu4z36yhrbgtycxf52iodlh5os4argm2ooia4ypwgnvlzgqd.onion/ Screen
Marina Family Medical
⬇️
2025-08-20
http://md7a4mzsppjuaw4zczoojpo7arqrlnmhlqoo35ttrc7l2lpeiblx2yqd.onion/ Screen
The Tech Interactive
⬆️
2025-08-20
http://l4wvjhcng4klrah4gldyyvo3x5p5o4frzbvwdhzqa6vkg2chistqj3yd.onion/ Screen
Young Adjustment Company
⬆️
2025-08-20
http://d26nwzgwylb3no3ar3rt3si3e3ujzndhp5wryxxlr76wba5snhap3tyd.onion/ Screen
Bucks County Opportunity Council, INC.
⬆️
2025-08-20
http://z33ua54qzvzyxtbe5oghqyvxfs5orftqlws3w5ndrtsvmaldcvbyf5ad.onion/ Screen

Monte

parsing : enabled

Links

Page title Available Last visit URL Screen
Blog
⬇️
2022-09-28
http://monteoamwxlutyovf7oxeviwjlbu3vbgdmkncecl2ydteqncrmcv67yd.onion/ Screen
Data Market
⬇️
2022-09-28
http://monteoamwxlutyovf7oxeviwjlbu3vbgdmkncecl2ydteqncrmcv67yd.onion/catalog/ Screen

Monti

parsing : enabled

Links

Page title Available Last visit URL Screen
404 Not Found
⬇️
2022-10-10
http://4s4lnfeujzo67fy2jebz2dxskez2gsqj2jeb35m75ktufxensdicqxad.onion/ Screen
MONTI - Leaks site
⬇️
2025-05-17
http://mblogci3rudehaagbryjznltdp33ojwzkq6hn2pckvjq33rycmzczpid.onion/ Screen
None
⬇️
Never
http://fzuaswymt34cbkneudijgqrzkalrgpsyfbo6uuodoeifwiqf3cwqscid.onion/
None
⬇️
Never
http://oiatmncwdk6jnavutic5zusl4sttwschx7nicvqykluyckekex3zqaad.onion/
None
⬇️
Never
http://jblxfrssnygh7bsoyict5wccgahvqp6tauncixr3y3dxypidiqy4tjyd.onion/
None
⬇️
Never
http://egtqjenfxq7g6sqnjknww3tsnlutzqlq747cf73ni3xsfxzqqz2f5qad.onion/
Index of /
⬇️
2024-12-15
http://edaus74qljecooagcvcg67quldd2hwokkr5zqj5jtdeuidgjoesvwdad.onion/ Screen
Apache2 Ubuntu Default Page: It works
⬇️
2025-05-24
http://gchf5ohuxo36metdnt3hfdz6m4up3pmv6t6m63llvldtnh57guwnp4qd.onion/ Screen
Index of /
⬇️
2024-12-20
http://363zyixg32bdudpakmd4n4bclbprcqrkyvdssv6yamozfurodktss2qd.onion/ Screen
Index of /
⬇️
2024-12-29
http://trqm74keteqm7jdathr2fgljf5tdhtifocoii4inmdu66ekpaotihvyd.onion/ Screen
Index of /
⬇️
2025-05-21
http://usmrktigxirv2qvpkwjr5n3pxz5hpsucffzujuo7e6f3y6se7uiqzwyd.onion/ Screen
Index of /
⬇️
2025-05-30
http://bvxhv3zfewf5jx4gcrsxrwbuwmjggffxjyv42vwj6b6u2clmgchxtfid.onion/ Screen
Index of /
⬇️
2024-12-28
http://drfxoorlgu5n4c4uhnfli7saprnl2p46i36duhyehmfp7ysn44e3quid.onion/ Screen
Index of /
⬇️
2025-05-19
http://t4h4hbkrrbrrfkbf6luhnewykjr52gkdmgfr6hbeeub5t2rcyhb4buad.onion/ Screen
Index of /
⬇️
2025-05-19
http://yyn3h2lnr5joqebus5syb2p3fzdms7avulvsn3m3gsdvwtgu2ow5c6ad.onion/ Screen
Index of /
⬇️
2025-05-19
http://v4httzsp6ri6xcw7lpmdduvhce5avtla3yocfru5suxpgcgo7rw7slyd.onion/ Screen
Server Error
⬇️
2025-08-04
http://myosbja7hixkkjqihsjh6yvmqplz62gr3r4isctjjtu2vm5jg6hsv2ad.onion/chat Screen
None
⬇️
Never
http://qkbbaxiuqqcqb5nox4np4qjcniy2q6m7yeluvj7n5i5dn7pgpcwxwfid.onion
⬇️
2025-08-04
http://monti5o7lvyrpyk26lqofnfvajtyqruwatlfaazgm3zskt3xiktudwid.onion Screen
⬇️
2025-05-26
http://il6jcce6f5htppc3smu4olpt5pz3akdg5h7k7tb4n45jixxu2o2oxlid.onion/ Screen
Directory listing for /
⬇️
2025-03-15
http://cls2wzky5vxgu54fg4fqdj4q4olyvmwt6rinmtgqsq5d3vubv7bdzgqd.onion/ Screen

Morpheus

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
MORPHEUS (contact morpheus.support@onionmail.org)
⬇️
2025-08-03
http://izsp6ipui4ctgxfugbgtu65kzefrucltyfpbxplmfybl5swiadpljmyd.onion Screen

Mortalkombat

Links

Page title Available Last visit URL Screen

Mount-Locker

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://mountnewsokhwilx.onion

Mountlocker

Links

Page title Available Last visit URL Screen

Muliaka

Links

Page title Available Last visit URL Screen

Mydata

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
⬆️
2025-08-20
http://mydatae2d63il5oaxxangwnid5loq2qmtsol2ozr6vtb7yfm5ypzo6id.onion/blog Screen
⬇️
Never
http://xszpovfd3q52omk5larjf4y7rziov2oee4u4amcm32wwsxc7ublmdtid.onion/
⬇️
Never
http://ot3vo3od2pajc7ymxdk6wimur7j7pgs2agvqlzyculowk3yoxzene2id.onion
⬇️
Never
http://2id7ik6lkd3jjjjlaarr3wckrxidp3bgl2jn5nhqciouk2ehuyakdiqd.onion

Mydecryptor

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://58b87e60649ccc808ac8mstiejnj.5s4ixqul2enwxrqv.onion

N3Tworm

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://n3twormruynhn3oetmxvasum2miix2jgg56xskdoyihra4wthvlgyeyd.onion

Naga

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://nagapay2ypwzsj7gb2hllyelhc6uepfrx7u356slaaemshrooxhbvfyd.onion/

Nefilim

Description

According to Vitali Kremez and Michael Gillespie, this ransomware shares much code with Nemty 2.5. A difference is removal of the RaaS component, which was switched to email communications for payments. Uses AES-128, which is then protected RSA2048.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://hxt254aygrsziejn.onion

Nemesis

Description

Links

Page title Available Last visit URL Screen
404 - Page Not Found
⬇️
2025-08-13
http://k7kzrgcoxsjm7fujj5votltw44vhidneye2dkzcnrw7k7gihhpxmctqd.onion/ Screen

Nemty

Description

Nemty is a ransomware that was discovered in September 2019. Fortinet states that they found it being distributed through similar ways as Sodinokibi and also noted artfifacts they had seen before in Gandcrab.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://zjoxyw5mkacojk5ptn2iprkivg5clow72mjkyk5ttubzxprjjnwapkad.onion

Netwalker

Description

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
None
⬇️
Never
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion/

Nevada

Links

Page title Available Last visit URL Screen
NEVADA
⬇️
2023-04-21
http://nevcorps5cvivjf6i2gm4uia7cxng5ploqny2rgrinctazjlnqr2yiyd.onion/ Screen
Error
⬇️
2023-04-21
http://nevbackvzwfu5yu3gszap77bg66koadds6eln37gxdhdk4jdsbkayrid.onion/ Screen
None
⬇️
2021-05-01
http://nevaffcwswjosddmw55qhn4u4secw42wlppzvf26k5onrlxjevm6avad.onion/

Nightsky

Description

Links

Page title Available Last visit URL Screen
Night Sky
⬇️
2022-01-25
http://gg5ryfgogainisskdvh4y373ap3b2mxafcibeh2lvq5x7fx76ygcosad.onion

Nightspire

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
NightSpire
⬇️
2025-04-27
http://nspireyzmvapgiwgtuoznlafqvlyz7ey6himtgn5bdvdcowfyto3yryd.onion/ Screen
NightSpire
⬇️
2025-04-27
http://nspireyzmvapgiwgtuoznlafqvlyz7ey6himtgn5bdvdcowfyto3yryd.onion/datas.php Screen
NightSpire
⬆️
2025-08-20
http://a2lyiiaq4n74tlgz4fk3ft4akolapfrzk772dk24iq32cznjsmzpanqd.onion/ Screen
Hello World | NightSpire
⬆️
2025-08-20
http://nspiremkiq44zcxjbgvab4mdedyh2pzj5kzbmvftcugq3mczx3dqogid.onion/ Screen
Hello World | NightSpire
⬆️
2025-08-20
http://nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion/ Screen
Database | NightSpire
⬆️
2025-08-20
http://nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion/database Screen

Nitrogen

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
NitroBlog
⬆️
2025-08-20
http://nitrogenczslprh3xyw6lh5xyjvmsz7ciljoqxxknd7uymkfetfhgvqd.onion Screen
Welcome to nginx!
⬇️
2025-02-20
http://2u6njk55okdxvrup5feu3wbhyxvlqla7yuj2oz3xkzz27yzc66vcirqd.onion/ Screen
Welcome to nginx!
⬇️
2025-02-20
http://jzl4bylm4bng2zgmeqw3lx6bcbxzb2hulicxneuosq26sshnitrcvcad.onion/ Screen
Welcome to nginx!
⬇️
2025-02-20
http://6a5ib4udgwlkyl3zzeyenedcb7d33j2vq7egpqykr5457uiskeu6zjad.onion/ Screen
Welcome to nginx!
⬇️
2025-01-24
http://hzyp7n436ecwo73xvrgnf5wmbjewszwut4h6vz4fu6f2oqd5zfcd7sad.onion/ Screen
Welcome to nginx!
⬇️
2025-02-21
http://67hvtslok5a4cwjxfmidbgbunsvckypf2dwkpxg3y2sabar5b4jidmyd.onion/ Screen
Welcome to nginx!
⬇️
2025-02-12
http://sqnnhgqr4iiwnkaih6vspyxmebz2vvjv3uybmjdynw6sne5plilunhyd.onion/ Screen
Welcome to nginx!
⬇️
2025-02-19
http://z4tonbkjybcllsvd45smpkqkk5uaspmlnvmysrkxt37wuudijvp7k2id.onion Screen
Welcome to nginx!
⬇️
2025-02-24
http://awrfq7pjydfp3hwbsun6ltxrrzths5ztgxj7i7ybx7twjrdvzvxkgwad.onion Screen
Welcome to nginx!
⬇️
2024-12-23
http://vkl3xfkp2vtpdzk7ohock3w2oiwwtvgnwbwvurrqafh5nhw23h43dbid.onion/ Screen
Welcome to nginx!
⬇️
2024-12-15
http://wjwbqeuni4zslbm4cduvo7uwyo653k4gdx2x4irj4zkrwyerksdcxryd.onion/ Screen
Welcome to nginx!
⬇️
2025-01-07
http://whdoefodpz4jjpwr5imipdntkh6kdbjazhx2zvdhcbmrtuxs6f3iwnid.onion/ Screen
Welcome to nginx!
⬇️
2024-12-15
http://6stzturcvnli6ilm6f6vweiymchi6lboc62u7ive2q7hn5hbbbauvgid.onion/ Screen
Welcome to nginx!
⬇️
2025-01-05
http://6blfnoe24tfpal2kmacphkjmzph3oghjdznsgkf23lmvjqbtgrmedpid.onion/ Screen
Welcome to nginx!
⬇️
2025-02-03
http://5xmd7pwpk4flmz5o2hbyndpkles5klmwbpxbw4jitzjnbhn4wkdktvad.onion/ Screen
Support Chat
⬇️
2025-03-12
http://bf7dw4n6zne6rbgjlpcsidphpk753nkyubipkym5t4pntgfyb6clw2qd.onion/login Screen
⬇️
Never
http://nxarphaf35qp2uuosaq54m3a2s5kt4svpcv56mvz6r7xy6na7uo5ypyd.onion/
⬇️
Never
http://bxi2cepk57dy3uhgwqd6dri6jtuqe7btay225rn6xkvvgnp2cvjvowqd.onion/
Welcome to nginx!
⬇️
2025-02-13
http://2idvzxbwvzbxhuniw7kfaimcvtqazmn7nmuw7codg65cshwwsvnpz7id.onion/ Screen
⬇️
Never
http://xqsdbtrtmufdyiqnkrkvosec4gqappf2egcptzqppjtqdevsoadakyqd.onion
Welcome to nginx!
⬇️
2025-05-22
http://7o4vytbuk42nuucim5idwgsg3zqkocpllqpykmrdk6zvs75ne7iwgmad.onion/ Screen
Welcome to nginx!
⬇️
2025-07-12
http://zvdlza5tjyl33mbx4k7w7t25ve6e5c3ve3nmfwqlygl6ww6s4lmsu4ad.onion/ Screen
Welcome to nginx!
⬆️
2025-08-20
http://55gqddfwtzfcuxwgoz746tas2djoiai4lbjvc36kq55prehyvedee3qd.onion/ Screen
Welcome to nginx!
⬇️
2025-08-20
http://ybe6nbidsn6grrnhx5adksp2sd4cz7povuuszhmliir5p4th7inmexid.onion/ Screen
Support Chat
⬇️
2025-04-28
http://ws6uapok34o3uvn3v6nru574urlvlbn5u3pi2xzyg765vpv2fixcm4ad.onion Screen
Welcome to nginx!
⬇️
2025-07-26
http://6lrsxvqscxtznb4fhux5u3vbslbanxjzxzgtokjtfwaitxe4pfgfebad.onion/ Screen
Welcome to nginx!
⬆️
2025-08-20
http://4fklgnaegkdpfgaa3rxr3x4xujq4yi6dcuumxikrquzar2m3meiqxwad.onion/ Screen
Support Chat
⬇️
2025-08-14
http://j56wqkcxzvuz25wzypoxua3fex5zfuc3emkhw4bemtiuikt46dwma6id.onion Screen
⬇️
Never
http://vz4ybjdqhtm753rznnwx67elvzhbcdkqk24g3ytnq32h6qpirigkytqd.onion

Noescape

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
NoEscape
⬇️
2023-12-09
http://noescaperjh3gg6oy7rck57fiefyuzmj7kmvojxgvlmwd5pdzizrb7ad.onion/login Screen
NoEscape
⬇️
2023-12-09
http://noescapemsqxvizdxyl7f7rmg5cdjwp33pg2wpmiaaibilb4btwzttad.onion/ Screen
NoEscape
⬇️
2023-12-09
http://noescapemsqxvizdxyl7f7rmg5cdjwp33pg2wpmiaaibilb4btwzttad.onion/archive Screen

Nokoyawa

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://lirncvjfmdhv6samxvvlohfqx7jklfxoxj7xn3fh7qeabs3taemdsdqd.onion
NOKOYAWA Leaks
⬇️
2023-01-25
http://6yofnrq7evqrtz3tzi3dkbrdovtywd35lx3iqbc5dyh367nrdh4jgfyd.onion/ Screen
Wall of Shame
⬇️
2023-10-08
http://nokoleakb76znymx443veg4n6fytx6spck6pc7nkr4dvfuygpub6jsid.onion/ Screen
None
⬇️
Never
http://accurfjvcphjtfogx42gpmoobffwqpqzvv2mf7smr6no62fy7ootjnid.onion
None
⬇️
Never
http://canarodqqttgf2ofv7rkj74jvani7f2ftrbkmuw7zwyydlxikazimyqd.onion
None
⬇️
Never
http://chattms45un5jmh23dak7udp2vt3dp25rlifqszvrhx2mb2psieyybid.onion
None
⬇️
Never
http://cnaaiic2skxbhnm35xmh3sohqgulpiyocj7yv7shrw4t34r5bvqbbayd.onion
None
⬇️
Never
http://comcomtjphtjl5mrtguatt5rgi4hymyrnzpqi6faztwmt6kw5tczqyad.onion
None
⬇️
Never
http://domaing5xpfmowjeah2z3icrxcbxd6e5mzk5gduohgzijrmm6lr3vxyd.onion
None
⬇️
Never
http://eperfs2u7bnyzpavtje6ruuwzatpzexdbjejdijgmgbe7wjje7lmkqyd.onion
None
⬇️
Never
http://frescayge2pa3epoytdocxz2vzagphzmrl6sqxrvrowftso4oqreh3ad.onion
None
⬇️
Never
http://gaston333sywqydo4mudwjgbeieryqut4trd34kntirejrvwefp4wwyd.onion
None
⬇️
Never
http://grsrobpx6t7j7eu4zi2xqm6fsrztaoptz4tie5xoamge6c3byeo462qd.onion
None
⬇️
Never
http://guardxxhqcmyddgikmgmdjpljhgwo7s4p7nnfljo54ogjd5vpu2labid.onion
None
⬇️
Never
http://hyundaiyo7kxalnkcghqpkfvapevwicis3ytnnue6xqivuvuvi5cnhyd.onion
None
⬇️
Never
http://mruedu746yv2hnsfxwgglxpqbtlgfu7xwschm7w5cl2okanfjhu6vgad.onion
None
⬇️
Never
http://modestorxo4s2vkjxo6xyue2lz7zefavtftb44apjojc5qhszq4dqnyd.onion
None
⬇️
Never
http://msxiy2dutavkdwxbjge2lnut4x7ai4z2xb3ay324tqzxgryrhahbazad.onion
None
⬇️
Never
http://muaedu3espka2gw5yqopmglslckonkeiduvymfkxjkggvtfqxkqydjqd.onion
None
⬇️
Never
http://pea3gvx6uyywne2f4dokv5cznsvzcayxsroai2ehozffkd576xfdm5yd.onion
None
⬇️
Never
http://pueblogmiocdtzj2of5556yzcl7frldcmqztxr6qcirgamzencolyhad.onion
None
⬇️
Never
http://rcdauehrqqex6pghmphfqz2jpuro2guhyenkolm2wld6bez344cbvmad.onion
None
⬇️
Never
http://roadiewfshampm6ee56olxymma7iwlhecjgekezmfviua5zv6vkoqzad.onion
None
⬇️
Never
http://rwavdkltqjoi62kvugd5m576uyn4yrlxcpwril5simavxv7z6xrxrbyd.onion
None
⬇️
Never
http://sabinwgf7aryxeel2ivx243tzymlsuk2s4lmrqnqn7hug5xecy6ob6ad.onion
None
⬇️
Never
http://snodfytsyn25r2umgfbygj7gxvul7egr4yx4j4n4yn7nb7crabafzwid.onion
None
⬇️
Never
http://stockkyjeldgtaj3evbtfb4id7jxnde6qnt6so3ndipcndykgknjlyyd.onion
None
⬇️
Never
http://wcch72vqgvsgcv4ic3awnonoqgspum6p47m4thum52rbq4fu3ctu6sqd.onion

Noname

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
NO-NAME Blog Since 2020 – 2023
⬇️
2024-11-16
http://noname2j6zkgnt7ftxsjju5tfd3s45s4i3egq5bqtl72kgum4ldc6qyd.onion Screen
Default Web Site Page
⬆️
2025-08-20
https://www.lockbitblog.info/ Screen
⬇️
Never
http://7tkffbh3qiumpfjfq77plcorjmfohmbj6nwq5je6herbpya6kmgoafid.onion/
⬇️
Never
http://lockbitvyq2uedft666b4ezxfvneq36jagpov4shitftjcoro7pjlsqd.onion
⬇️
Never
http://6qubpgkb7vjd6upivya4ll2xvzkx6zdj5bfwfo7qqm4jd3cuv4nwg2id.onion

Nova

Description

Rebrand of RALord

parsing : enabled

Links

Page title Available Last visit URL Screen
Update Links - Nova GBlog
⬇️
2025-08-20
http://novavdivko2zvtrvtllnq45lxhba2rfzp76qigb4nrliklem5au7czqd.onion/ Screen
Nova Panel | Login
⬇️
2025-07-11
http://novazzitmugtbjwuttc5hhsemkmvwh3iyt27oeeunu5mkw62qpfeykid.onion/ Screen
Nova Official - Nova Chat
⬇️
2025-07-11
http://novaeogps7purkdhxmaymmnanqiwtqf3r3iu3we4khkzwegkoefbxnyd.onion/ Screen
Update Links - Nova GBlog
⬆️
2025-08-20
http://novav75eqkjoxct7xuhhwnjw5uaaxvznhtbykq6zal5x7tfevxzjyqyd.onion/ Screen
Update Links - Nova GBlog
⬆️
2025-08-20
http://novavagygnhqyf7a5tgbuvmujve5a2jzgbrq2n4dvetkhvr2zjg27cad.onion/ Screen
Nova GBlog
⬆️
2025-08-20
https://novatd4577pzlvdyy42slydhrhru7fpcflbbxlajcmbfrgzyeis6d3id.onion/ Screen
Nova GBlog
⬇️
2025-08-20
https://novag4k2te3mstt2xq5irywlpaw6edgkpiwgg4t2q7eecisj2qqtvbid.onion/ Screen
Nova GBlog
⬆️
2025-08-20
https://novaoddh3vxylxqpsfdjprliknbzgbkv6nkazpzu3cvykrgpyzuywryd.onion/ Screen
Nova GBlog
⬆️
2025-08-20
https://vctmy3tytuah2offux4bixzunh53pnepsnsrr2hly6blpgiewqodnzad.onion/ Screen
Nova GBlog
⬆️
2025-08-20
http://leak7y2247fj7dbb35rpfyxuyaqtwbshiwxp6h35ttzlhrxmhvi4fead.onion/ Screen
⬇️
Never
https://novazzitmugtbjwuttc5hhsemkmvwh3iyt27oeeunu5mkw62qpfeykid.onion/ Screen
⬇️
Never
https://nova5cr2op6uo73korzmzkvil2btj3erjaujwtbbvtpko3yx7ivq3myd.onion/
⬇️
Never
https://nova25eabfdep76t52dt34n2qdrhrn7vxuaeitcy5x2ovxnut767bwid.onion/
⬇️
Never
https://npnlc7i2mxnngj6angcj5pwesbaapksstqqez2qmtgmimezcpo4haryd.onion/
⬇️
Never
https://raaskpzmkcoraswmzotjkzplq3aw6mcbogvd5uzbgsnhqb7az3ax2qid.onion/
Nova Official - Nova Chat
⬇️
2025-07-11
https://novaeogps7purkdhxmaymmnanqiwtqf3r3iu3we4khkzwegkoefbxnyd.onion/ Screen
Nova Official - Nova Chat
⬇️
2025-07-11
https://noval3kb6snxuofmqmw2we3cvzci2tfknurgxi7gdyet55xh6zhno5id.onion/ Screen
NC V2 | Nova Clouds
⬇️
2025-08-14
http://ms5fasbpbfpbxmgtrhcspvg5ajmb2tpxdcg7x2wdd6equemuivqi5syd.onion/ Screen

Nullbulge

Description

A hacktivist group protecting artists' rights and ensuring fair compensation for their work.

parsing : enabled

Links

Page title Available Last visit URL Screen
404 Not Found
⬆️
2025-08-20
http://nullbulge.co/blog.html Screen
Just a moment...
⬇️
2025-06-24
http://nullbulge.se Screen
None
⬇️
Never
http://nullbulge.com
Error Response Page
⬇️
2024-07-30
http://goocasino.org Screen
None
⬇️
Never
http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion

Nvrmre

Description

AKA Lemon

Links

Page title Available Last visit URL Screen
⬇️
Never
http://ioot5g6iwj26tcowu4646qyijf2sgeddggoxgch5r3oovkh6gfco3sqd.onion

Obsidian Orb

Links

Page title Available Last visit URL Screen

Oceans

Links

Page title Available Last visit URL Screen

Offwhite

Links

Page title Available Last visit URL Screen

Onepercent

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://5mvifa3xq5m7sou3xzaajfz7h6eserp5fnkwotohns5pgbb5oxty3zad.onion

Orca

parsing : enabled

Links

Page title Available Last visit URL Screen
Leaks
⬆️
2025-08-20
http://orca66hwnpciepupe5626k2ib6dds6zizjwuuashz67usjps2wehz4id.onion Screen

Osyolorz Collective

Description

Links

Page title Available Last visit URL Screen
Osyolorz Collective
⬆️
2025-08-20
http://hackerosyolorz77y7vwj57zobwdeuzydhctz3kuuzr52ylzayvxuqyd.onion Screen

Ox Thief

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Incident ID e15dd788012dd8c15add053c411529ef5ae67fd8f69b93ca73f56b6c2ce2f2a6
⬇️
2025-03-13
http://oxthiefsvzp3qifmkrpwcllwscyu7jvmdxmd2coz2rxpem6ohut6x5qd.onion/ Screen

Pandora

Description

Pandora ransomware was obtained by vx-underground at 2022-03-14.

Links

Page title Available Last visit URL Screen
Pandora Data Leak
⬇️
2022-05-03
http://vbfqeh5nugm6r2u2qvghsdxm3fotf5wbxb5ltv6vw77vus5frdpuaiid.onion/
None
⬇️
Never
http://pandoraxyz.xyz/

Paradise

Links

Page title Available Last visit URL Screen

Paradise2

Links

Page title Available Last visit URL Screen

Pay2Key

Description

Links

Page title Available Last visit URL Screen
Pay2Key Leak Directory!
⬇️
2022-03-15
http://pay2key2zkg7arp3kv3cuugdaqwuesifnbofun4j6yjdw5ry7zw2asid.onion/
None
⬇️
Never
http://pay2keys7rgdzrhgzxyd7egpxc2pusdrkofmqfnwclts2rnjsrva.b32.i2p/?i=3d1e4594aeb351854fcc800da08214a059ed16

Payloadbin

Description

Links

Page title Available Last visit URL Screen
Payload.bin
⬇️
2022-08-27
http://vbmisqjshn4yblehk2vbnil53tlqklxsdaztgphcilto3vdj4geao5qd.onion/ Screen

Payoutsking

Description

Payouts King Group. We are not RaaS. No affiliates are accepted. We use Tox messaging protocol.

parsing : enabled

Links

Page title Available Last visit URL Screen
Blog
⬆️
2025-08-20
https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/ Screen
⬆️
2025-08-20
https://v2mw3spxqhggig5zjd6tjnfamwntrprreij3dq77jlq74dduyjafeead.onion/ Screen
⬇️
Never
http://c6nrwsloenpiat7zilh243nvhe7a3edsfm3ct3kpxhu2fv7z36ksjcad.onion/

Pear

Description

ABOUT US: "Pure Extraction And Ransom (PEAR) Team is the community of highly responsible and strictly disciplined members. We are a private team and have nothing common with any other threat actors. We've been monitoring this field for a long-long time. So, we understand all the processes and know well how it all works."

parsing : enabled

Links

Page title Available Last visit URL Screen
PEAR
⬆️
2025-08-20
http://peargxn3oki34c4savcbcfqofjjwjnnyrlrbszfv6ujlx36mhrh57did.onion/ Screen
403 Forbidden
⬆️
2025-08-20
http://yxwomyfmexm3bfcuumnugrzwluol5qwsw6pmne7jklgmzthkp35l2jqd.onion/ Screen
PEAR
⬆️
2025-08-20
http://pearsmob5sn44ismokiusuld34pnfwi6ctgin3qbvonpoob4lh3rmtqd.onion/ Screen
403 Forbidden
⬆️
2025-08-20
http://etus2tmakckdlkyjpevoyciuao7er5fj3qm26aev3nch4fusptefiayd.onion/ Screen
403 Forbidden
⬆️
2025-08-20
http://csxilwnl7orv6rwfjen5ye3tefk5shjtr4tysuykgxjsyngpvoqrvbid.onion/ Screen

Petya

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://petya37h5tbhyvki.onion
None
⬇️
Never
http://petya5koahtsf7sv.onion

Phalcon

Links

Page title Available Last visit URL Screen

Phantom

Links

Page title Available Last visit URL Screen

Phobos

Links

Page title Available Last visit URL Screen

Play

Description

Ransomware

parsing : enabled

Links

Page title Available Last visit URL Screen
PLAY NEWS
⬆️
2025-08-20
http://mbrlkbtq5jonaqkurjwmxftytyn2ethqvbxfu4rgjbkkknndqwae6byd.onion Screen
PLAY NEWS
⬆️
2025-08-20
http://k7kg3jqxang3wh7hnmaiokchk7qoebupfgoik6rha6mjpzwupwtj25yd.onion Screen
PLAY NEWS
⬇️
2024-12-30
http://k7kg3jqzffsxe2z53jjx4goybvxu3a557kpsqakpwi6mrvfgcdo55tid.onion Screen
PLAY NEWS
⬆️
2025-08-20
http://ipi4tiumgzjsym6pyuzrfqrtwskokxokqannmd6sa24shvr7x5kxdvqd.onion Screen
PLAY NEWS
⬆️
2025-08-20
http://j75o7xvvsm4lpsjhkjvb4wl2q6ajegvabe6oswthuaubbykk4xkzgpid.onion Screen
⬇️
Never
http://zi34ocznt242jallttwvvhihrezjdzfgflf3uhdv6t3z23hhcn54efid.onion
⬇️
Never
http://37wb3ygyb3r2vf2dt5o3ca62zlduuowvkkwjrtbcgc5iri4t6rnzr7yd.onion
⬇️
Never
http://eppsldmcnv3ylabsx5srvf36wnk6jrowg6x4unxclv55rnu4kf5436yd.onion
⬇️
Never
http://slg7tnjb65swwyaebnyymyvo73xm36hxwugdsps7cwcxicizyzyt2byd.onion
403 Forbidden
⬆️
2025-08-20
http://x6zdxw6vt3gtpv35yqloydttvfvwyrju3opkmp4xejmlfxto7ahgnpyd.onion Screen
⬇️
Never
http://eppsldmcnv3ylabsx5srvf36wnk6jrowg6x4unxclv55rnu4kf5436yd.onion
Welcome to nginx!
⬇️
2025-02-25
http://jnbiz5lp44ddg4u5rsr4yebbpxa3iytcsshgbqa4m6r6po5y57h6yxid.onion Screen
Welcome to nginx!
⬇️
2024-11-01
http://sm2gah7bjg6u2dfl3voiex6njh2kcuqqquvv7za37xokmbcivsgqcnad.onion Screen
Welcome to nginx!
⬇️
2024-11-02
http://z7u6dkys7b2aeibvklxga7mldzrepoauiuniqwfhdadkkwwgmv6bqhad.onion Screen
Welcome to nginx!
⬇️
2025-02-25
http://kri3lez34pbqra3xs5wxo55djldtsekol6tuqdjqecqzga6dpnjqruyd.onion Screen
Welcome to nginx!
⬇️
2024-11-02
http://iejj6bywviuecjwi3kxanzojqroe3j3phzgplvrdzcicimtcw6xgk3yd.onion Screen
Welcome to nginx!
⬇️
2025-02-25
http://xixkhm6inbg6t5642t2pjafsjsh3eaonpjysdcfvr3zvadlqb6nhryad.onion Screen
Welcome to nginx!
⬇️
2025-02-25
http://giix5r763sbxmu442tmwfb4thqbz4i5ppxcqsmnnlqnm2yiezv6epxqd.onion Screen
Welcome to nginx!
⬇️
2024-11-02
http://mokcrzbitq2gc5qcpxcbce43pawuthyaoazl6iz2xknj53ebyb4r4eid.onion Screen
403 Forbidden
⬇️
2025-07-04
http://gpph6awu7hqsmzmr5sihusjoscp3itwtk3b4i2chwspmka2ikuqcwaqd.onion Screen
Welcome to nginx!
⬇️
2025-02-25
http://v3r6g4q3b2jpqusznecxexr5aqi42vy5ts6jy6fu3strecvb5c2woead.onion Screen
Welcome to nginx!
⬇️
2024-11-02
http://4xo3cicwo2rhpwr6vkgwt7mqg4oiqihsmoxwlmklf4sjoatkdqjtmcyd.onion Screen
⬇️
Never
http://a4gbdvoorwn3tcqijoedvdeukqaqwc6t2kx4gh3gm37gv4p37evvzqad.onion
Welcome to nginx!
⬇️
2025-02-16
http://6jb5avmh6rvcb7vcux7kaivnzpqcrfg4ui4xv2co5vmspgrwll7lkkyd.onion Screen
Welcome to nginx!
⬇️
2025-02-16
http://doz7omlqqanryonvil4iuj65shzcv3efupqwubkza6553wnekrrd4uid.onion Screen
Welcome to nginx!
⬇️
2025-02-16
http://hbwsxlq3uzknabg2blt7d4mcbu24oriklji36zdqsz3ou3mf2d7bvoid.onion Screen
Welcome to nginx!
⬇️
2025-07-04
http://ysknyr5m5n3pwg4jnaqsytxea2thwsbca3qipi64vlep42flywx7dgqd.onion Screen
Index of /
⬆️
2025-08-20
http://b3pzp6qwelgeygmzn6awkduym6s4gxh6htwxuxeydrziwzlx63zergyd.onion Screen
403 Forbidden
⬇️
2025-08-20
http://p2qzf3rfvg4f74v2ambcnr6vniueucitbw6lyupkagsqejtuyak6qrid.onion Screen
403 Forbidden
⬇️
2025-08-20
http://whfsjr35whjtrmmqqeqfxscfq564htdm427mjekic63737xscuayvkad.onion Screen
Welcome to nginx!
⬇️
2025-02-15
http://v3zgtoh5etfeuvhtgdpiejle4mzy7gdvoygildytlxwoay6qvrkixfad.onion Screen

Playboy

parsing : enabled

Links

Page title Available Last visit URL Screen
PlayBoy
⬇️
2024-10-30
http://vlofmq2u3f5amxmnblvxaghy73aedwta74fyceywr6eeguw3cn6h6uad.onion/ Screen
None
⬇️
Never
http://ovcbyl77wplz67mdcilq6yq67eg56milg3xjehoiklbxrs4mondbklyd.onion/

Polyvice

Links

Page title Available Last visit URL Screen

Prolock

Description

PwndLocker is a ransomware that was observed in late 2019 and is reported to have been used to target businesses and local governments/cities. According to one source, ransom amounts demanded as part of PwndLocker activity range from $175k USD to $650k USD depending on the size of the network. PwndLocker attempts to disable a variety of Windows services so that their data can be encrypted. Various processes will also be targeted, such as web browsers and software related to security, backups, and databases. Shadow copies are cleared by the ransomware, and encryption of files occurs once the system has been prepared in this way. Executable files and those that are likely to be important for the system to continue to function appear to be skipped by the ransomware, and a large number of folders mostly related to Microsoft Windows system files are also ignored. As of March 2020, encrypted files have been observed with the added extensions of .key and .pwnd. Ransom notes are dropped in folders where encrypted files are found and also on the user's desktop.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://msaoyrayohnp32tcgwcanhjouetb5k54aekgnwg7dcvtgtecpumrxpqd.onion

Prometheus

Description

Ransomware written in .NET, apparently derived from the codebase of win.hakbit (Thanos) ransomware.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://promethw27cbrcot.onion/blog/
None
⬇️
Never
http://promethw27cbrcot.onion/ticket.php?track=

Proton

Links

Page title Available Last visit URL Screen

Providence

Description

Links

Page title Available Last visit URL Screen

Proxima

Links

Page title Available Last visit URL Screen

Pyrx

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
end or a new era?
⬇️
2025-04-17
http://c2mdhim6btaiyae3xqthnxsz64brvdxsnbty4tvos65zb565y4v55iid.onion Screen
404 Not Found
⬇️
2025-04-17
http://c2mdhim6btaiyae3xqthnxsz64brvdxsnbty4tvos65zb565y4v55iid.onion/b/ Screen
404 Not Found
⬇️
2025-04-17
http://c2mdhim6btaiyae3xqthnxsz64brvdxsnbty4tvos65zb565y4v55iid.onion/blogs.html Screen
嘉茗轩旗下平远信息网
⬇️
2025-08-19
http://pyrx.cc Screen

Pysa

Description

Mespinosa is a ransomware which encrypts file using an asymmetric encryption and adds .pysa as file extension. According to dissectingmalware the extension "pysa" is probably derived from the Zanzibari Coin with the same name.

Links

Page title Available Last visit URL Screen
Pysa's Partners
⬇️
2022-02-21
http://pysa2bitc5ldeyfak4seeruqymqs4sj5wt5qkcq7aoyg4h2acqieywad.onion/partners.html

Qilin

Description

Aka Agenda

parsing : enabled

Links

Page title Available Last visit URL Screen
Qilin
⬇️
2023-02-17
http://ozsxj4hwxub7gio347ac7tyqqozvfioty37skqilzo2oqfs4cw2mgtyd.onion/ Screen
⬇️
2021-05-01
http://24kckepr3tdbcomkimbov5nqv2alos6vmrmlxdr76lfmkgegukubctyd.onion
Qilin
⬇️
2023-02-17
http://wlh3dpptx2gt7nsxcor37a3kiyaiy6qwhdv7o6nl6iuniu5ycze5ydid.onion/blog Screen
DDOS Protection
⬇️
2025-05-10
http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion/ Screen
WikiLeaks
⬇️
2024-07-09
https://wikileaksv2.com Screen
Qilin blog
⬇️
2025-08-20
http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion Screen
⬇️
Never
ftp://dataShare:nX4aJxu3rYUMiLjCMtuJYTKS@85.209.11.49
⬇️
Never
ftp://dataShare:2bTWYKNn7aK7Rqp9mnv3@188.119.66.189
WikiLeaks V2 - New Version of the Legendary WikiLeaks Project
⬇️
2025-04-18
https://31.41.244.100/ Screen
⬇️
Never
http://ijzn3sicrcy7quixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvad.onion
⬇️
Never
http://kbsqoiyihadmwczmxkbovk7ss2dcynitwhhfu5yw725dbogo5kthfaad.onion
⬇️
Never
http://ftp://dataShare:nX4aJxu3rYUMiLjCMtuJYTKS@176.113.115.97
⬇️
Never
http://ftp://dataShare:2bTWYKNn7aK7Rqp9mnv3@176.113.115.209
⬇️
Never
http://ugefls6xolqo6anb6jydjtwqbr5h3st2stfo6j4or2hp7ak5zypwq2yd.onion
None
⬇️
Never
http://ftp://dataShare:2bTWYKNn7aK7Rqp9mnv3@185.39.17.75
Login
⬇️
2025-06-09
http://6d453sm6732jpr5gjs6zrjzysurnmrwi67624goptyly2xuz2kmjixad.onion Screen
None
⬇️
Never
http://ftp://datashare:C}^SLA"5Vl?vX#R4tg^}:hd3@185.196.10.52
None
⬇️
Never
http://ftp://dataShare:2bTWYKNn7aK7Rqp9mnv3@185.196.10.19
Login
⬇️
2025-08-11
http://vn2untbh4etoqoc4rfsrzlautth7vm62swv7ohemsy4tgh3a4j5ykgyd.onion Screen
Login
⬆️
2025-08-20
http://p2zg4yqlsflg77opdzcjiu3reyj3wx2owwez2tcyv3vemmz7wbyccyqd.onion/ Screen
Login
⬆️
2025-08-20
http://ytdfc3dvgudgq4zyjwtipzbsu7arbiqvygfqdyqiygkvry2hy47oq2ad.onion Screen
None
⬇️
Never
http://22odvea7bampzr7k2dztbqda67fpau6hcy7sgn2npucaz5gcjmmzrgqd.onion/
Sign In
⬇️
2025-08-12
http://ji57fr53anp7wb44tbbnp72qcgbhqywy4jmbncawdcrejj5amuvh3zqd.onion/ Screen
Login
⬆️
2025-08-20
http://z2rmyu57rkmlsfif4lovlz36ph7lxmjiawilmeryfoupwnbuplm4suqd.onion Screen
Login
⬆️
2025-08-20
http://djixgstarlzvmqsqcewlsfxlqzwd3i2eqs24mccfrfvrhqihjmssahqd.onion Screen
Login
⬆️
2025-08-20
http://zlubnjgvsf6ifxswnvpfgvp36tlzubzggn4txk5mi5qgt377ytzai6yd.onion Screen
None
⬇️
Never
http://ifjnyofk7xpdrqzp3pgyorwgoyrxjkjic4aqxcz4sjxjhbpewfoxngad.onion

Qilin-Securotrop

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Index of /
⬆️
2025-08-20
http://securo45z554mw7rgrt7wcgv5eenj2xmxyrsdj3fcjsvindu63s4bsid.onion/ Screen

Qiulong

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2024-07-23
http://62brsjf2w77ihz5paods33cdgqnon54gjns5nmag3hmqv6fcwamtkmad.onion/ Screen

Qlocker

Description

login page, no posts

Links

Page title Available Last visit URL Screen
⬇️
2022-11-08
http://gvka2m4qt5fod2fltkjmdk4gxh5oxemhpgmnmtjptms6fkgfzdd62tad.onion Screen

Quantum

parsing : enabled

Links

Page title Available Last visit URL Screen
Quantum Blog
⬇️
2024-01-16
http://quantum445bh3gzuyilxdzs5xdepf3b7lkcupswvkryf3n7hgzpxebid.onion/ Screen
Quantum Blog
⬇️
2024-01-16
http://quantum445bh3gzuyilxdzs5xdepf3b7lkcupswvkryf3n7hgzpxebid.onion Screen
None
⬇️
Never
http://26gzvue4vlgxuiaaotxl3bbdepuf55sdrsailywbrc7kdrcgwo62ghqd.onion
None
⬇️
Never
http://275dg33wjetp6arghjtp3d7265nsknx2heho5n6bqioy2ehl7c3i3iyd.onion
None
⬇️
Never
http://2gknqtqreqfoedfd3sey4vqgp7fhc4xyagtj6yl3pz6swkliuakfx7ad.onion
None
⬇️
Never
http://2k5qdebrbzv2uj2xz25f53bhjyqgmv2vixyy7p3vaeeb2bqz6jhnalad.onion
None
⬇️
Never
http://3uzycwcxrccpvrwx43mpr3gxwcqqgu4x72kedws6zuolp45gopjrzqyd.onion
None
⬇️
Never
http://6kkjbpmqavf2nvs33furf3hywg2z4e4zrnwnmzegcpq4atfyp3jilnid.onion
None
⬇️
Never
http://77jtf3wyb4rtsemeodl6h3hfblhgwj32ex3r7ywigg5mzfaqf7w5x7qd.onion
None
⬇️
Never
http://7qlb63hy45ijihaeal26uyoms4r33dlrg64dr7ry7blnzhhwhov6jsad.onion
None
⬇️
Never
http://7sqjgyldxtur4p3nkpdzacldqonnovklnibxhz4y6saremsrmh6vf2yd.onion
None
⬇️
Never
http://agxyd52t6tfoahsvi6mfk7nqwpoe2xj6wp75vnv7ffrfxg5vtw6guxid.onion
None
⬇️
Never
http://b2rt3dmb62jo62e2rr5rfrpyomka477tjkcni2fsamjd3wksolae5wqd.onion
None
⬇️
Never
http://bfdwhgjey6xb25e6pc6i7upnswh4znqwwnmlmgzapiwfmt7ugzcwvyyd.onion
None
⬇️
Never
http://bi7v6o5djhfji22usugjzpk26nvvwugaubrf3yypyvmkzw7su2nad5id.onion
None
⬇️
Never
http://cee77a5wsey5vohubq76en4bgsqbdrasito3zn7ziu5vouhbzxtx6syd.onion
None
⬇️
Never
http://ct7jsq3dbwcvcafnwli7tfv2pf62y2rfhos4a66gu7twqkcclkih6wqd.onion
None
⬇️
Never
http://dblgdn4manmaiewnsqa3vgm26v7ujtx75wtev5pyfmtpww4ofqrqpiid.onion
None
⬇️
Never
http://dw6sy3pt54fh6d3yo4wpb7qjtwdlyyi3qd5oabdwlmlmuyhsxvnblvqd.onion
None
⬇️
Never
http://fjlprvuqzs6h4ielcdkmof5nju3ent7c34esaptm7677xono7osvp5yd.onion
None
⬇️
Never
http://friazjtqhznoknwi5354lnkwa4lhgjti74l4asfhsjeoe5dulwitpcqd.onion
None
⬇️
Never
http://k2j6llaw66bvlgxcy67uj2prdqqzbl7aj46wab4mpdyizpmati55kfad.onion
None
⬇️
Never
http://leqg2fthiage4ockldnf7trwdx3bvehni7vjf6wbwsitnbjtotbv3nid.onion
None
⬇️
Never
http://nugus3xk456m3xhokm2q5zusujhqodirm5vfke6jmsej2jy6sgbn4oqd.onion
None
⬇️
Never
http://nxvvamxmbdn3latdplq6azgeeuieaek32h674nl6lzavcod2f2obvxyd.onion
None
⬇️
Never
http://ohmhgcrvte6aftgnm5lefq7ztannicarzo6lus2bih3zg6ugklf4tsyd.onion
None
⬇️
Never
http://oyjydoka32xa24doeymhq4thoibxqdd7i7hnngojpycd74frggkvhyyd.onion
None
⬇️
Never
http://q45frho6hatxtx7qxjytt4cswinakvc2h6iag65jlsaws32xdzz47kyd.onion
None
⬇️
Never
http://rrmywkltwjpntybqj7migd5ibdzzxulnhgndb6dnoe6unlljslqb7lid.onion
None
⬇️
Never
http://uwr2mmcqtroeyu6bzgivwwzdcpe2a4e74r2srlzveyltsi57n5bnsbqd.onion
None
⬇️
Never
http://wcmxtfzde2hmhsreqgflwvkawmyfvuyqcebuq5w5qj3rllo2jpb4l2yd.onion
None
⬇️
Never
http://wly4qu4q6abduzwm7ryai4ehysgnk5f25v6ddofcyuasbfntwnqjkcid.onion
None
⬇️
Never
http://x3djueexuhivjtdj5udkjzfsm37kiaoeqy5ywluljbfsf2wsuom5yyid.onion
None
⬇️
Never
http://xrjwgvn3sv75zrcmfdarz3futzx54uyy6o6si5pj5phhee3nlokkopyd.onion
None
⬇️
Never
http://yizydlt5rl6br3qihvjdgfsprrq2ealnoq2eg6koqs6yv47d3byucxqd.onion
None
⬇️
Never
http://zes5libwlgrfnttkpgtbimbixyb4t6k6rhuxhayzq76j7zgxqt64piad.onion

Quoter

Links

Page title Available Last visit URL Screen

Ra Group

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
RA World
⬇️
2024-01-08
http://pa32ymaeu62yo5th5mraikgw5fcvznnsiiwti42carjliarodltmqcqd.onion Screen
502 Bad Gateway
⬇️
2023-08-25
http://hkpomcx622gnqp2qhenv4ceyrhwvld3zwogr4mnkdeudq2txf55keoad.onion Screen
RA World
⬇️
2025-02-10
http://raworldw32b2qxevn3gp63pvibgixr4v75z62etlptg3u3pmajwra4ad.onion Screen
RA World - RA World
⬇️
2025-02-10
http://raworlddecssyq43oim3hxhc5oxvlbaxuj73xbz2pbbowso3l4kn27qd.onion/ Screen

Rabbit Hole

Links

Page title Available Last visit URL Screen
Rabbit Hole
⬇️
2024-04-12
http://z5jixbfejdu5wtxd2baliu6hwzgcitlspnttr7c2eopl5ccfcjrhkqid.onion Screen

Radar

Links

Page title Available Last visit URL Screen
radar.ltd
⬇️
2025-07-16
http://radar.ltd Screen

Ragnarlocker

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2021-05-01
http://rgleak7op734elep.onion
This site has been seized
⬆️
2025-08-20
http://rgleaktxuey67yrgspmhvtnrqtgogur35lwdrup4d3igtbm3pupc4lyd.onion/ Screen
⬇️
2021-05-01
http://p6o7m73ujalhgkiv.onion
⬇️
Never
http://2dxxyil6kur3qpht2tkklupdgacrcbfun6qf5jmk3hafmt6n6ockbzid.onion
⬇️
Never
http://goh2zbohdiblk23scvtae7delci5cioy73la2lnrduxutxksl7xiscqd.onion
⬇️
Never
http://t2w5byhtkqkaw6m543i6ax3mamfdy7jkkqsduzzfwhfcep4shqqsd5id.onion
⬇️
Never
http://wxbpssv4hiwlcgt4cxam3cznu4feqgf5pqfibbku3x6dwvtcakdkyeid.onion
⬇️
Never
http://xxbsnxdqmthgpydddmuvg7yzy6pdfnlnlepxa5my4mjiqjsee6yidhyd.onion
⬇️
Never
http://7twfgaqyik3xfuu4.onion
This site has been seized
⬆️
2025-08-20
http://ragnarmj3hlykxstyanwtgf33eyacccleg45ctygkuw7dkgysict6xyd.onion/ Screen

Ragnarok

Description

According to Bleeping Computer, the ransomware is used in targeted attacks against unpatched Citrix servers. It excludes Russian and Chinese targets using the system's Language ID for filtering. It also tries to disable Windows Defender and has a number of UNIX filepath references in its strings. Encryption method is AES using a dynamically generated key, then bundling this key up via RSA.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://wobpitin77vdsdiswr43duntv6eqw4rvphedutpaxycjdie6gg3binad.onion
Decrypt Site
⬇️
2021-08-27
http://sushlnty2j7qdzy64qnvyb6ajkwg7resd3p6agc2widnawodtcedgjid.onion/

Ralord

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
New upgrade for Brand
⬆️
2025-08-20
http://ralordqe33mpufkpsr6zkdatktlu3t2uei4ught3sitxgtzfmqmbsuyd.onion/ Screen
New upgrade for Brand
⬇️
2025-08-20
http://ralord3htj7v2dkavss2hjzviviwgsf4anfdnihn5qcjl6eb5if3cuqd.onion/ Screen
New upgrade for Brand
⬆️
2025-08-20
http://ralordt7gywtkkkkq2suldao6mpibsb7cpjvdfezpzwgltyj2laiuuid.onion/ Screen
Nova Panel | Login
⬇️
2025-07-11
http://novazzitmugtbjwuttc5hhsemkmvwh3iyt27oeeunu5mkw62qpfeykid.onion/ Screen

Ramp

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion
Log in | RAMP
⬆️
2025-08-20
http://rampjcdlqvgkoz5oywutpo6ggl7g6tvddysustfl6qzhr5osr24xxqqd.onion Screen
None
⬇️
2021-05-01
http://ramp4u5iz4xx75vmt6nk5xfrs5mrmtokzszqxhhkjqlk7pbwykaz7zid.onion
Log in | RAMP
⬆️
2025-08-20
http://ramp4u.io/ Screen

Rancoz

parsing : enabled

Links

Page title Available Last visit URL Screen
Rancoz | Blog
⬇️
2023-10-17
http://ze677xuzard4lx4iul2yzf5ks4gqqzoulgj5u4n5n4bbbsxjbfr7eayd.onion/ Screen

Ranion

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://ranionv3j2o7wrn3um6de33eccbchhg32mkgnnoi72enkpp7jc25h3ad.onion/ Screen

Ransom Corp

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://sewo2yliwvgca3abz565nsnnx3khi6x7t5ccpbvvg6wgce4bk2jagiad.onion/

Ransombay

Links

Page title Available Last visit URL Screen
RansomBay | Went on a journey...
⬆️
2025-08-20
http://rrrbay3nf4c2wxmhprc6eotjlpqkeowfuobodic4x4nzqtosx3ebirid.onion/ Screen
RansomBay | Went on a journey...
⬆️
2025-08-20
http://rrrbayguhgtgxrdg5myxkdc2cxei25u6brknfqkl3a35nse7f2arblyd.onion/ Screen
RansomBay | Went on a journey...
⬆️
2025-08-20
http://rrrbaygxp3f2qtgvfqk6ffhdrm24ucxvbr6mhxsga4faefqyd77w7tqd.onion/ Screen

Ransomcartel

Links

Page title Available Last visit URL Screen
Ransomware - Control Panel
⬇️
2022-03-03
http://u67aylig7i6l657wxmp274eoilaowhp3boljowa6bli63rxyzfzsbtyd.onion/
None
⬇️
Never
http://cartelraqonekult2cxbzzz2ukiff7v6cav3w373uuhenybgqulxm5id.onion/

Ransomcortex

parsing : enabled

Links

Page title Available Last visit URL Screen
offline
⬇️
2024-08-12
http://gg6owuhu72muoelkt2msjrp2llwr2on5634sk5v2xefzmobvryywbhid.onion/ Screen

Ransomed

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2024-06-07
https://ransomed.vc/ Screen
404 Not Found
⬇️
2023-09-08
http://k63fo4qmdnl4cbt54sso3g6s5ycw7gf7i6nvxl3wcf3u6la2mlawt5qd.onion Screen
⬇️
2024-06-07
http://f6amq3izzsgtna4vw24rpyhy3ofwazlgex2zqdssavevvkklmtudxjad.onion/ Screen
None
⬇️
Never
http://g6ocfx3bb3pvdfawbgrbt3fqoht5t6dwc3hfmmueo76hz46qepidnxid.onion Screen

Ransomedvc2

Description

RansomedVC2 aka RebornVC aka RansomedVC (rebrand) under new leadership.

parsing : enabled

Links

Page title Available Last visit URL Screen
RansomedVC | Blog
⬇️
2025-08-19
https://ransomed.biz/ Screen
RansomedVC | Blog
⬆️
2025-08-20
https://ransomed.vc/ Screen

Ransomexx

Description

RansomExx is a ransomware family that targeted multiple companies starting in mid-2020. It shares commonalities with Defray777.

parsing : enabled

Links

Page title Available Last visit URL Screen
RansomEXX v2
⬆️
2025-08-20
http://rnsm777cdsjrsdlbs4v5qoeppu3px6sb2igmh53jzrx7ipcrbjz5b2ad.onion/ Screen
⬆️
2025-08-20
http://zubllg7o774lgc4rdxmfcfpjewfkqa7ml7gxwl5fetogc7hbkvaprhid.onion/ Screen
⬆️
2025-08-20
http://jbdg4buq6jd7ed3rd6cynqtq5abttuekjnxqrqyvk4xam5i7ld33jvqd.onion/ Screen
403 Forbidden
⬇️
2025-07-19
http://rbx2hfyej6sogivjtw2z2xkcqwgtiy653ap5jylggsrj6glbmfr7axqd.onion/ Screen

Ransomhouse

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
©RansomHouse
⬇️
2022-09-30
http://xw7au5pnwtl6lozbsudkmyd32n6gnqdngitjdppybudan3x3pjgpmpid.onion Screen
©RansomHouse
⬆️
2025-08-20
http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/ Screen
Index of /
⬆️
2025-08-20
http://q2injs6dqvzemu2kkfpk7u3lsrcn4rddip3h2a7oc6uqwq6vjnduamad.onion/ Screen
Index of /
⬇️
2025-08-20
http://b4k2fi62ctrid4k73itusuvcz5x5yczk27bpqdrsvwu3nl5mnz5dg3id.onion/ Screen
Index of /
⬆️
2025-08-20
http://gfkngfw25qwhd2sn43x7cflcehk3bb7v2uifjndr2sc3k2abhqs22rad.onion/ Screen
Index of /
⬆️
2025-08-20
http://ge74uts2ybu22kzwahiayovxelbq5fwhywl73agev5w4fef2e5ikplid.onion/ Screen
Index of /
⬆️
2025-08-20
http://xlirefmk3w2gsk3n5mkddinbfdatk6lhi7fj36knubhtoxiaqyus44yd.onion/ Screen
Index of /
⬆️
2025-08-20
http://q2bwuip5xq4qjn2vyevprcddhk26cigyqfqfu6yki7korjys2rposaad.onion/ Screen
Index of /
⬇️
2025-08-20
http://nuhnnxg3owawo36mwdffyblbzplhthfswny55mh7yhbxq74en6jihyad.onion/ Screen
Index of /
⬆️
2025-08-20
http://m7vtnbsgctdcsccqmpnmi6igg3pcuiliqqqsq6uonkzg4blpa4eysiad.onion/ Screen
Index of /
⬆️
2025-08-20
http://vopa354z4toilkjn4ileaf6rinkzn2givaokvj4yguq5kbiqoulxnzyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://helc2q6kbiyz4cwegzlp5anigkbjsbowjxrjxv3j27rjbvycgr2qd2qd.onion/ Screen
Index of /
⬇️
2025-08-20
http://aw5q5nzdok52cgprlzik4n44qstoajrlbixqqukqqcennjyas4x4opad.onion/ Screen
Index of /
⬆️
2025-08-20
http://bffujdbkhxfs2y63haztye4txuqgbkttmtxuxzkrlnruyioak5aoohid.onion/ Screen
Index of /
⬆️
2025-08-20
http://swnoxbuqfh7dmbqzaigqllkkljspipnvft3a4offxh3m5zwxg6ob46ad.onion/ Screen
Index of /
⬆️
2025-08-20
http://nw4f4x2gix7y7y3nizwj2fnf5u4tqy2mwej62r6tdqye4s5ogrtftuid.onion/ Screen
Index of /
⬆️
2025-08-20
http://pnhyueueqsog3gbjuq3o7ixqbcdctpqnzv4uujsg3j76nt2bsm2p3rid.onion/ Screen
Index of /
⬆️
2025-08-20
http://oujq7kjgzj4r3fyvsb2wtz6bxycrvawqdtj6zqgljw7u4hwqsak34jqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://jjgql4ddcs3hk5ptmfrpjriplialbjwi5a4tekffbfzv6n6oj5bmklid.onion/ Screen
Index of /
⬆️
2025-08-20
http://hyinn53atxthbme4n76ry76jiaohqd6uk35jwni32g6dqtqkaejgquid.onion/ Screen
Index of /
⬇️
2025-08-19
http://3nr2abdugd4mqabdmhialw3nbhol2qpywsphkocrhp6f7yxp3cps5iad.onion/ Screen
Index of /
⬇️
2025-08-20
http://blofpgq5q3talt3y2w3y6r3focrtrk7ugmwl3e6a4pjuf5t2tivkxbqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://t7ezcjqq7h24gwswhyde72x4gkqxsjeyt2fxz44kcls6ipm4wd6bmsid.onion/ Screen
Index of /
⬆️
2025-08-20
http://57yqe2tksgsmmwaqrxf45uaqy45t3hxu3dcnywjdks6lhtfztkpx57yd.onion/ Screen
Index of /
⬆️
2025-08-20
http://uvl645c47e5bozdzrrtjtm6pea5oltef63tsewz5ucmubvsj5i7meiid.onion/ Screen
Index of /
⬇️
2025-08-20
http://omdcwhef4ztuwhdiv3dbcgz2iyh2yb3gkkbusgvegbyjcacctahpxryd.onion/ Screen
Index of /
⬆️
2025-08-20
http://uv4sykhrapb2t3mnhw6imkbdym4fh6vstwcdsvbtzrvdwzcd5zzlylqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://7yrwf73tckb4mtt2kms4qc7nr7rzghu3jdzycm4w4qq2nwrybi7hq7ad.onion/ Screen
Index of /
⬆️
2025-08-20
http://ggyosmcjq5vw7qimqhn2bf2gbr5zhdqmrfl35nnki6q5dmvblcqsmhyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://rfbka2dt27wyuzymonzzx2zeaohx7sejti4gpihhc22hv74hya4h4vyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://lpx3qaviraf2k7uozkf2qi47beenvt4dwyr2f3zgdwjglyywhtikiead.onion/ Screen
Index of /
⬆️
2025-08-20
http://oplhizp4lkdxmrydoz4ixngotsqialrexmuficduihuktq4777tlb3qd.onion/ Screen
Index of /
⬇️
2025-08-20
http://kd4zqe5ao4wio7shv747uszayc2xtpvoxirs3pnm7nrld5462jzf43qd.onion/ Screen
Index of /
⬆️
2025-08-20
http://cdalrbmvj36y24xbejqxgg6htzcgrbyf52ikoqgjwxvf566uycawa6id.onion/ Screen
Index of /
⬇️
2025-08-19
http://agx3kdwbkrff5csgkuf7rl3uytbgraqyb5kmr2ltp7pnza4puxgsyeid.onion/ Screen
Index of /
⬆️
2025-08-20
http://bqj4qln6jluwlsa32qjen2wlpgnqold4hgpkxny4x3vtsiecvdphwtqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://scuj56wenkc4oltbf35mxjqprwpyw7hfy4pwfwb54nfjs2ukemfodnyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://4bzbm2ifa2hffdb5celerb43mdbqoi6hcso3b2y4b6stdiiu2dww5bqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://cwiukccdpixacamo24wkdkv4pgu62xtnbfuvauvqr5zjcr4jg2w4dcyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://j3pbdpnbkib7evm4rhzq64vdxqd3tfgr2x25v65hfefmlukah5nfpeyd.onion/ Screen
Index of /
⬇️
2025-08-20
http://mc2pt7cfb4p3xojzsmyzt2pe7chobgkbddpdqxdscks6ttbki77xl2id.onion/ Screen
Index of /
⬆️
2025-08-20
http://cxkk2csneiefspqrv75vw5766sw56t67tluuekk6mm2k4f7vagh7qbyd.onion/ Screen
⬇️
Never
http://74zmq5sfydbci37dwwqd3ybkosw7wsuq5ymmc3fvyely45mtkvamh5yd.onionn/
Index of /
⬇️
2025-08-20
http://uiw34f2i7x5lz2l2r33a23h3q5h3dzvrmwyz5m65uwdgkdkappn7jkyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://3vl65cye5nopltxxds73drcjddfq5wxwc2o5sm2rq3gddbs3ce7vn5ad.onion/ Screen
Index of /
⬆️
2025-08-20
http://dj7ww4rxmvy5vsqxqn557p3nzjmt64q4fg57tteono6ezzm3nsmhgpad.onion/ Screen
Index of /
⬆️
2025-08-20
http://texnb5y3cjaf2srwfjkafdzznqc3idjlncqiiobhq4yzlqw6sgvbljqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://otxn2ad3ypniexesajgomjnpwbkdjdit7uii2zv5v4c4u76r2rnlrtyd.onion/ Screen
Index of /
⬇️
2025-08-20
http://zabhu2tvl3elihuccjzl4n35m27smgyxc5zkbgz3rcewjn6tjt2ihiad.onion/ Screen
Index of /
⬆️
2025-08-20
http://vxpudlncob2ouf6pnic5khdwdb3j52ersb636c4xm3s2p2wxg6vyi4yd.onion/ Screen
Index of /
⬆️
2025-08-20
http://kcikcoor63fa4qw6gx7yp2jxnvxbsxxdwd2znz72izt74rpdjfha2yqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://5aidibsmc4wt5l3lw4k5wtfqopbckllb3pntw7xw4qiem4a3eeacrlyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://atpimkcvvlvyizwazff6r5ioq6nnb7txijdwvlq4i6d5b7adx6c5egyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://xf7e5nnpiemhu6lpb5f723i4amgshhj33ny6c5ctbdjtc5duwtortoad.onion/ Screen
Index of /
⬆️
2025-08-20
http://pol7t4rw4dymnyruiqkckbeul2xxntn7x3sek3yw553pxbwag3n4eeid.onion/ Screen
⬇️
Never
http://ondvd45cnciqs7fzu5ewm5li2ib75bppxjaapcyilceauq5xpmzbswad.onion/
Index of /
⬆️
2025-08-20
http://mo3nqtrrrvguce64bvenu25uciry7buw2hzke4wxm22jhr57zmsj65qd.onion/ Screen
Index of /
⬆️
2025-08-20
http://py5fgtglinssndrkrnbwgwjzxlsxl5zbyr3ypdiijgsllht2smznwpqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://jv2txdk66t6ijaugve3kte67yuahfaebrivy4okuqqvriaagsvi4pgad.onion/ Screen
Index of /
⬆️
2025-08-20
http://enppltlenqakx4lyekcz5xmlhybemrii7l4gjnijs2mqvwr26jp73fad.onion/ Screen
Index of /
⬆️
2025-08-20
http://gxru2ucw4yxkicwdiee6wpqwkogh2x3scfcnhcgb4lcyo4uid44734qd.onion/ Screen
Index of /
⬇️
2025-08-19
http://pi25hxaofhsoxjh5g4e6iqcasoynlwygevqkbemzaalkyxwpgk77tqid.onion/ Screen
Index of /
⬇️
2025-08-19
http://uzf4tt7buqhj5xzb7jnnmsd4wtufua4qyzjgjf4sn2vwniiqz5oi5lid.onion/ Screen
Index of /
⬇️
2025-08-20
http://ftgvamayqmlyjkpf3dosoyfafbfpxxtxagsnt45sqauulckwupr2guid.onion/ Screen
Index of /
⬆️
2025-08-20
http://lxgnxg3cdv4uq2ps4e5i66bykvol6rw7bsvr5chdpksusiqwhyx7cxqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://hqvcotd73c6hjfc3ogukvc37jgs2krmowyposqudq2rodtawmatxpyad.onion/ Screen
Index of /
⬆️
2025-08-20
http://77k3qrvleqx3jn5mx73fpmhcfpk3pdrjs7tkgaxcsf4ojgizfhvmlhid.onion/ Screen
Index of /
⬆️
2025-08-20
http://lejfkugm7arhigu2vhtcursl564e73gjrq23upuaccuafbj73rgbnfid.onion/ Screen
Index of /
⬆️
2025-08-20
http://7kobff7iod6tmnyjgoqc4o367ufky2cvda4knnlvo2hakdzy4v4gffqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://obrze5nyt6pmx4ptffqliah7hxqb3je6jlghg7ynoy653nqvye43koid.onion/ Screen
Index of /
⬇️
2025-08-20
http://tgcj6ad5dqmuayc7ldm3zw4bz3hx45nf54oe7vqtfs4hai4wsgbnseyd.onion/ Screen
Index of /
⬇️
2025-08-20
http://4sw54rh5et4adx7oj6sl2kqkra243dq3dyhlxmoyt7vez6vncufv2gyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://oxbwvjzd2oc4cb4jkrnpwbuvabyj2pgmoh6q73jsuq35skfbta3p3uad.onion/ Screen
⬇️
Never
http://vksaeydmtcfee2qiwbdxb7lijqtwxzy55g4ft72vjvmjvxyuppskdwad.onion/
Index of /
⬆️
2025-08-20
http://4s2org6ns4uhmamkr2tshq6f6auusktjjdoo23rskwhxfdlxlnx5rnyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://4dmex5fuyap32y6lkpglp5cy3ivoua452o57cezsxhfdlnhgvlw6sxid.onion/ Screen
Index of /
⬆️
2025-08-20
http://m5ubrfq5bgwcckdxb3g3fcughlfntzv6kcvhw7bdkqsx7johtljefaqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://zlwljlbtakummd6biufuvljgqwbpvmrftd5kjtzxwjtn27jdzeahm5ad.onion/ Screen
Index of /
⬆️
2025-08-20
http://tbgdp3msmgiddu7yhdo2fsuhlaggcoj3oez7wdmofznqm4dhevpekeyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://yiqfcld3loz7rh4kcmxrf4azyeqa7sonfyxqlnjjbxmmfxhzbm2vsjad.onion/ Screen
Index of /
⬇️
2025-08-19
http://jhtym7doz6dt5xdq4dd5wuhmyaa6dtesv4lrnasb5scwofguffiewcqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://zdgj7z7dhmn5xgtrj4wh4gsf35hzst6blunfm3xf5iqpq6msiluxmmid.onion/ Screen
Index of /
⬆️
2025-08-20
http://2yce6tllc6xin4kucqr4aynscfjsg7l7pgz3pv7rat5o3vjeruxpknid.onion/ Screen
Index of /
⬆️
2025-08-20
http://xbpdja46coptbjt4a62lintyk547q54k7gubekbtsyqxivie4vln7syd.onion/ Screen
Index of /
⬇️
2025-08-20
http://4hmvksa7vw5x3mytrguzcjxvj3alfbapxaekudmiigpztqxxv7dynnqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://2ynd4lgi277los7ykngk3my3rx3ehitx4agrpomrilwjic4iqisbikid.onion/ Screen
Index of /
⬆️
2025-08-20
http://qiu5vqx2k3oyq3aeyz3pieh6g6yjzo7l5zofidxfvnahy3vgb2vuy6ad.onion/ Screen
Index of /
⬆️
2025-08-20
http://gomf6ssy2bgsxlfbawncxdydwa4m76i4gzbwusmdwepuamx46uu6eqyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://fmrsmdsuokgzj5oujoqcod23gnvkqptg3vzbcqz6vw2ci7gonigijuyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://374ydckkglmslkqy3coatm5nn2rk3hg43lgci4wrhizhr47zfyfbdead.onion/ Screen
Index of /
⬆️
2025-08-20
http://7izw24yz3udwtvfoq4lshv2ibow6jahx4lojoxsdt2nkqzzpr7osoxad.onion/ Screen
Index of /
⬆️
2025-08-20
http://zz7ez3cgy6o4eehu5bc2cs7t4jvq7j7duragx3pfrgnafxui7l2ybzqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://kp5amzgfhwmpn26vnmx7h445x4xb7ofaxitonovt6mlewq5bpawkq7id.onion/ Screen
Index of /
⬆️
2025-08-20
http://x3rx5uqoohqzfcnq3neiqwunb6eh5yc4ybu26nxwqqltclkvdvwbprad.onion/ Screen
Index of /
⬆️
2025-08-20
http://2f7k6jhxwbpiyuomb27eywzollahlje2xph3t5wckupkoeluantatbad.onion/ Screen
Index of /
⬆️
2025-08-20
http://tlr5h3my4jyvwgmyrvu2oadls2o3f377cz2bqnu3g7oaycofiweqjfyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://ib3ru7m66tg37w6o7zxe4upntw2p7236c63wb5n3beeapiuor535vhad.onion/ Screen
Index of /
⬇️
2025-08-20
http://rivdgsucnasob3iiux5j4g4ybqz6flxgx2vz4h6i2wfu42hbbmwwcuqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://dfhu2iceszxurn7lf5mb5xhainmb7vulpizncjomtn4w5j5cv3pz52qd.onion/ Screen
Index of /
⬆️
2025-08-20
http://2ntyvlixm5zzhn2zgowgbbu5s6forpttomntefg5dapivr5qwokkyvyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://uax2s63op7lboqhuxscjfiwcea4retnus6z2ph33cd44dyqdsyosj6id.onion/ Screen
Index of /
⬆️
2025-08-20
http://w6kf2ktnbzx3hha25snxdwg57ydqdskzcs5tdrdztajb2vn7jk5hzrid.onion/ Screen
Index of /
⬆️
2025-08-20
http://vokr3ancppaevval5hwpqpm43szyj7nysfoxqfsrc274jabs5m2227yd.onion/ Screen
Index of /
⬇️
2025-08-20
http://mdpkohdcvgyiexi4yihiufdi2wmau5yd6wjr7rituvwntifxuh43deyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://iwtkvmhwx7g743ytqj6yiibbb33a3ycezssyn6gai2hny7b2ynez6sad.onion/ Screen
Index of /
⬆️
2025-08-20
http://uiecrea6byqjfppofxjcku2rjs6qxeqblnc7ljveopbtd4ih635saiid.onion/ Screen
Index of /
⬆️
2025-08-20
http://n7f7ic7islqbyw3vzans3mddgaooirbf4i75tvsfvxjvni7vxanwczad.onion/ Screen
Index of /
⬆️
2025-08-20
http://utijlj5t2xamyekjr3ur7vpdnttaqit57fher2nzibih3nqil75jhjyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://lc6wrbsdvaayqkhj47bjkj7mfnaiyvsnufmdnkhai6de3uxhu6bssgyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://nxml7szv4m3hd6gtjjg62xejyusbbqvmb3thfwaa6wimablrzuk7p3qd.onion/ Screen
Index of /
⬆️
2025-08-20
http://jt772jtwpfrluifvz34ti43kfgv6lz7bgiviwopl73slo6a3wetch4yd.onion/ Screen
Index of /
⬇️
2025-08-20
http://2xipgq7vsu6d6llgg4tr4wxwdc5tbmmtx3jxfax3kx2dorkcnzsimwqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://d7akeguwmrxmrg7tgzx7a73mksq3zpcjjk2c4jibfhmvrhhd6oprsfyd.onion/ Screen
Index of /
⬇️
2025-08-20
http://ozokx66qqmtvjbkbkudtfnrfy5euwug2gbekqm6ug42j76knmtzcrkid.onion/ Screen
Index of /
⬇️
2025-08-20
http://yj2xh4wxcjncsgj7642jzky7uf4mrjcp6zrcdgxylxbepyvgv4meljqd.onion/ Screen
⬇️
Never
http://l2abuimje7jrypvv57p2ihf36rza2etoobyvsddgxqrsssn7tyb7txid.onion/
Index of /
⬆️
2025-08-20
http://43xvcojnfpqlbjxrbuuulyh3xtqrkl3qboi67xxd4jsigmpccbhxcoid.onion/ Screen
⬇️
Never
http://6ibv6c5n6orfgzpt4apgqtrbr3ot2ninpbpi6hwolq2lzcgj6lzj4rid.onion/
Index of /
⬆️
2025-08-20
http://kinkwgtp4sfj3tovixjlvsklktjul7v5o55lkf6cgmlnugqlletzsxad.onion/ Screen
⬇️
Never
http://k2xhcuvhwh5cyua5vwa4xjeyvyfatzkrh5yn5kc5munvglzge4cod2ad.onion/
Index of /
⬆️
2025-08-20
http://zv7u2tclxajbgae6ba4jkisnkfkts3lk7lxlypmuqktrk42qmo2c7hqd.onion/ Screen
⬇️
Never
http://secxrosqawaefsio3biv2dmi2c5yunf3t7ilwf54czq3v4bi7w6mbfad.onion/
Index of /
⬆️
2025-08-20
http://cqwdv5rxut5l3blbeg74ddfo6ya65xsxqan7vawffdng6ynd2kulfkqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://nlqnxzqixcwazwyib4bft2m6ikjrtihh4qgdtnmpmbi3meio5jj2xsad.onion/ Screen
Index of /
⬆️
2025-08-20
http://naurcsrhvsnxotv5awcsmddlcwgv447fvolmkyo6gfgszvtofijd6oid.onion/ Screen
Index of /
⬆️
2025-08-20
http://rthvusw7vbnulb27tsiacrlewiykoda4wvefeshtsj4bx53o4j6mfrid.onion/ Screen
Index of /
⬆️
2025-08-20
http://cwywajs3ounh4rioelodfprm72544iokpmttlbitzxmjgqoummdpmqid.onion/ Screen
Index of /
⬆️
2025-08-20
http://3wahjydjf6min3z67a3254l3uoftkccvn3or3itdppjiz4oogceuy6ad.onion/ Screen
Index of /
⬆️
2025-08-20
http://dbxgloxt65pvn37ec2of3np4rzo2ksgntxtxbpc4q3sxiur2aiohwqyd.onion/ Screen
Ransomhouse ©
⬆️
2025-08-20
http://am26uhnrvhikyekz7h5qgjhv6x4arnzpcr2tw4wxqdg7hw525xs4o2qd.onion Screen
Index of /
⬇️
2025-05-02
http://tl7m4jpgd5zrrv5lvkl33viucmgztwu6vvr3wqqb7pvlp7i2mavq2jyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://qq4kljefxqsslnl45bxho57meuwpxgn2vdgonlzhmlebnywhst5fupyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://ajs5cguwcrm7hocjyswds6hm6hamfrp2zoqfywq7or2j6yvycfo2mpid.onion/ Screen
Index of /
⬆️
2025-08-20
http://ns7ed6yloo7w5p2lh3mg5bcmkv3aip6wwn7kagb7pxouetm4ymfvsiad.onion/ Screen
Index of /
⬆️
2025-08-20
http://vwgq5uld5govh3va4ybcda47cye2wd2jnaqy5si56qm3t47dtafy2zqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://vvocdlrov5pc5ej5iuba35vfjehegbdcgnthkt5xr7acekjb4l7y74id.onion/ Screen
Index of /
⬆️
2025-08-20
http://nklp3mw3ne5h5ndzo6l2riesmseg2wcbj2tgethqmrsknly4q23ziuqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://iadt27m7yxkouefkcgdettyepemal4jins3htxkhpvhl7w2dgapprnid.onion/ Screen
Index of /
⬆️
2025-08-20
http://yqotxqmc4gjofhiyp7wvhwqcbc3cszrsvjt4n3uqq3i3pilxhmdxtzqd.onion/ Screen

Ransomhub

Description

Our team members are from different countries and we are not interested in anything else, we are only interested in dollars. We do not allow CIS, Cuba, North Korea and China to be targeted. Re-attacks are not allowed for target companies that have already made payments. We do not allow non-profit hospitals and some non-profit organizations be targeted.

parsing : enabled

Links

Page title Available Last visit URL Screen
RansomHub | Home
⬇️
2025-04-02
http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion/ Screen
Index of /
⬇️
2024-05-09
http://mjmru3yz65o5szsp4rmkmh4adlezcpy5tqjjc4y5z6lozk3nnz2da2ad.onion/ Screen
⬇️
Never
http://an2ce4pqpf2ipvba2djurxi5pnxxhu3uo7ackul6eafcundqtly7bhid.onion
Index of /
⬇️
2024-08-03
http://fpwwt67hm3mkt6hdavkfyqi42oo3vkaggvjj4kxdr2ivsbzyka5yr2qd.onion Screen
⬇️
2025-03-25
http://xeuvs5poflczn5i5kbynb5rupmidb5zjuza6gaq22uqsdp3jvkjkciqd.onion/ Screen
⬇️
Never
https://7vy5mydtkf4hqo3g5s4v7skmyn2xdh4mxg3xgtcqnequuospqtsmutqd.onion/
⬇️
Never
http://crylcxzmkllsvq3qgh6gmeg3abqcyliepqza2r57o43gsfwomibq2cyd.onion/
⬇️
Never
http://qa5qvqhtuzlyzrrgc7dkepyj34hb4psf6hk7jmiyn6cef7fxajdleoid.onion/
RansomHub | File Upload
⬇️
2025-04-01
http://ransombgegc4e2vuq45noxekkmauikzt7qu6ab2rqsthdyxdpdufbqid.onion/ Screen
⬇️
Never
http://ransomgxjnwmu5ceqwo2jrjssxpoicolmgismfpnslaixg3pgpe5qcad.onion/
⬇️
Never
http://shedjytnmsdgyey7ho7r52leod3plffhe3yjmhyxfxxivnunnmw7coid.onion/
⬇️
Never
http://vqcrizmr7757hjbamfcb7pei2zv462o4ypi2djj4xvy5ax7f2b3c7bad.onion
⬇️
Never
http://davtdavm734bl4hkr3sr4dvfzpdzuzei2zrcor4vte4a3xuok2rxcmyd.onion/
⬇️
Never
http://dd4djzr2ywfcox3zfvpkpyh3b657hsdwpwv5cfkmdfde2lr3fpz6spad.onion/
⬇️
Never
http://cki3klxqycazagx3r5prae3nmfvxmwa34beknr3il4uf76vxd76akqid.onion/
⬇️
Never
http://pod4gkypkd6kykwoht3kioehhpoh4k75ybdfoe6q7hqbphrd77b32jqd.onion/
RansomHub - Login
⬇️
2025-02-11
http://445ouvbxlevrxm7phyfr4au3ritat62zl7cwvrarvonrwmququordayd.onion Screen
⬇️
Never
http://nr4jw2reeta2u4n2sq4sejjudllir4yfotzf5d4p3wn2ep6ddomtxxid.onion/
⬇️
Never
http://m52fl4estv4lmcvqhssh7mb7nsygiwe7oybhjhny7iuzrzwulq455eqd.onion
⬇️
Never
http://brclvwefzszko5xrlan7pebyliqdkv5cw75xksrxp772urjytkko5fyd.onion
RansomHub - Login
⬇️
2025-01-09
http://rmr2kgq6vzifnyoaz7jaxdx5t6gsxurbakah5bafatsqldtt2mwneyid.onion Screen
RansomHub - Login
⬇️
2024-12-27
http://xdg53hbpwshgtbfbm6m7nv3ckkduo3dfdwdearcsvybfb3qaf4v7suyd.onion Screen
⬇️
Never
http://toq7bk6abkr6lapwj3k22ffu4ud5jpox7jbfgzetpz7lxb427katstid.onion
RansomHub - Login
⬇️
2025-03-05
http://tjnt7x2xodhthwrfnabhloogoo66jrgohgzpta22uwbqznsvrm5tu4id.onion/ Screen
RansomHub - Login
⬇️
2025-03-02
http://fvixrjsdk2adazfnz4mrdvr4eznm346fk33y7nos65bdrtmfvw7f5vid.onion/ Screen
RansomHub - Login
⬇️
2025-03-17
http://vhxbjx4iaeqgna22kqt5ajlqi72vbm6qcjev3efgr5oiklgptvjvjhqd.onion/ Screen
RansomHub - Login
⬇️
2025-03-05
http://yszafmehxkoa7hrcay7cnyogfrmjqc4grds6innadspii5oz6fneyzyd.onion/ Screen
RansomHub - Login
⬇️
2025-03-08
http://i4xita2momkw2jitqohbqgomjxqp53pyvgv5gbogvendbx3ucnynekyd.onion/ Screen
⬇️
Never
http://3ysbtsnhldlijvfdv7hwkr2gl3op2d56puspeo4whs6p272sde6fq5id.onion/
404 Not Found
⬆️
2025-08-20
http://bd3atkmicmcif6mliquqdxltjq6mxvagw44gealayp34awtcx3ywlxid.onion/ Screen
404 Not Found
⬆️
2025-08-20
http://biurt7anlhkncf2t3dvvtlszpnnyg3oiksyapcikxostz6zfrh4csvid.onion/ Screen
404 Not Found
⬆️
2025-08-20
http://bzfp6qfir7bfqjxnpgofwvfzoyca7kmcsfliot5zzfsas6oofwo7zoad.onion/ Screen
⬇️
Never
http://fmcrlb2t524cpiiqiudbvdjmgvaczix2o5y5uc3zvi57niiyl467qgyd.onion/
⬇️
Never
http://gsqxzyynjegp73imth5p3ug4etgbehd3pb72e4zmiro4st3s2nlkmgyd.onion/
⬇️
Never
http://hjs27fuzq4j4gzshhbakt274eewxv2qdwmeugjx5eepwoaecczdkiiyd.onion/
Index of /
⬆️
2025-08-20
http://i2agsvbyoy3viwel7ucjqtzcq3ocsj3jqqew5wlwpxty6uxd455qkoqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://kfvsqtlnfa5iiweywpubtqk4c2omc2vu4hvy26mhanaahtvpifzuxlid.onion/ Screen
⬇️
Never
http://l5hzzorh57w4wp5va4ouye77x5f2apqd6rvvh3tb2a7vcenn6c5a2fad.onion/
Index of /
⬆️
2025-08-20
http://ljxmkfr6kl3ovwgkxycdrvvdf6tk7qdhgowcjkpsiocg7j5uuhmszyyd.onion/ Screen
404 Not Found
⬇️
2025-08-20
http://red46f427ed4ogc76gscsqrytpdh4gy5reh2g6dzjpbm24k3ns2t27qd.onion/ Screen
Index of /
⬆️
2025-08-20
http://xznhtihjpaz3rwcgwqrv3jipbbivlg5ttsdqoet55xe5a3nbxi47jwqd.onion/ Screen
404 Not Found
⬆️
2025-08-20
http://y2hkrrb7aba2pgyvpfzqj3vlhbw7e2wj2t2wvtlmkr54yqz7p5ghnfid.onion/ Screen
RansomHub - Login
⬇️
2025-03-08
http://yvst24dvz66unqqes6se3p3flxyzbtohaz6faknu5ne3zzeq2jumpiid.onion Screen
RansomHub - Login
⬇️
2025-03-08
http://sres5y2sze7lqkk5s4ahns5lhvc7nr5hqy5lchbxcvhaty2hnivdacqd.onion Screen
RansomHub | R.I.P.
⬇️
2025-08-20
http://ijbw7iiyodqzpg6ooewbgn6mv2pinoer3k5pzdecoejsw5nyoe73zvad.onion/blog Screen
RansomHub | R.I.P.
⬆️
2025-08-20
http://rnc6scfbqslz5aqxfg5hrjel5qomxsclltc6jvhahi6qwt7op5qc7iad.onion Screen

Ransomware Blog

Description

Also known as MedusaLocker

parsing : enabled

Links

Page title Available Last visit URL Screen
Ransomware blog – We will not give ourselves a name. Just watch out for the leakage of your data:)
⬆️
2025-08-20
http://z6wkgghtoawog5noty5nxulmmt2zs7c3yvwr22v4czbffdoly2kl4uad.onion Screen
Submit a Ticket
⬆️
2025-08-20
http://qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion/ Screen

Ranzy

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://37rckgo66iydpvgpwve7b2el5q2zhjw4tv4lmyewufnpx4lhkekxkoqd.onion

Rapture

Links

Page title Available Last visit URL Screen

Raznatovic

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2024-06-07
http://f6amq3izzsgtna4vw24rpyhy3ofwazlgex2zqdssavevvkklmtudxjad.onion/ Screen
404 Not Found
⬇️
2024-06-07
http://f6amq3izzsgtna4vw24rpyhy3ofwazlgex2zqdssavevvkklmtudxjad.onion/market.html Screen
404 Not Found
⬇️
2024-06-07
https://ransomed.vc/market.html Screen
⬇️
2024-06-07
https://ransomed.vc/ Screen

Red Ransomware

parsing : enabled

Links

Page title Available Last visit URL Screen
Red Ransomware Group - Wall of shame
⬇️
2024-08-17
http://33zo6hifw4usofzdnz74fm2zmhd3zsknog5jboqdgblcbwrmpcqzzbid.onion/ Screen
None
⬇️
Never
http://ybxtfftwy2iwfqjy7fvvcrt5sd55fx3sk2yuztbx3y2dxb4dvqdhsiid.onion

Redalert

parsing : enabled

Links

Page title Available Last visit URL Screen
Board of shame
⬇️
2022-12-08
http://blog2hkbm6gogpv2b3uytzi3bj5d5zmc4asbybumjkhuqhas355janyd.onion/ Screen
None
⬇️
Never
http://qrcxhs4x2n4a65rk3zbwm5hu6475bi4w2mdjhfmusovnjc6hc6qcv3ad.onion
None
⬇️
Never
http://ocsmkribkmoij3uhvhxlpxlpebqhzo5uingee7mvebnv57jqya745uyd.onion
None
⬇️
Never
http://ybxtfftwy2iwfqjy7fvvcrt5sd55fx3sk2yuztbx3y2dxb4dvqdhsiid.onion
None
⬇️
Never
http://gwvueqclwkz3h7u75cks2wmrwymg3qemfyoyqs7vexkx7lhlteagmsyd.onion/

Relic

parsing : enabled

Links

Page title Available Last visit URL Screen
Project Relic. Dumps, leaks, news, announcements
⬇️
2023-06-03
http://relic5zqwemjnu4veilml6prgyedj6phs7de3udhicuq53z37klxm6qd.onion Screen
None
⬇️
Never
http://chatc46k7dqtvvrgfqjs6vxrwnmudko2ptiqvlb7doqxxqtjc22tsiad.onion/?auth_id=

Revil

Description

REvil Beta MD5: bed6fc04aeb785815744706239a1f243 SHA1: 3d0649b5f76dbbff9f86b926afbd18ae028946bf SHA256: 3641b09bf6eae22579d4fd5aae420476a134f5948966944189a70afd8032cb45 * Privilege escalation via CVE-2018-8453 (64-bit only) * Rerun with RunAs to elevate privileges * Implements a requirement that if "exp" is set, privilege escalation must be successful for full execution to occur * Implements target whitelisting using GetKetboardLayoutList * Contains debug console logging functionality * Defines the REvil registry root key as SOFTWARE\!test * Includes two variable placeholders in the ransom note: UID & KEY * Terminates processes specified in the "prc" configuration key prior to encryption * Deletes shadow copies and disables recovery * Wipes contents of folders specified in the "wfld" configuration key prior to encryption * Encrypts all non-whitelisted files on fixed drives * Encrypts all non-whitelisted files on network mapped drives if it is running with System-level privileges or can impersonate the security context of explorer.exe * Partially implements a background image setting to display a basic "Image text" message * Sends encrypted system data to a C2 domain via an HTTPS POST request (URI path building is not implemented.) ------------------------------------ REvil 1.00 MD5: 65aa793c000762174b2f86077bdafaea SHA1: 95a21e764ad0c98ea3d034d293aee5511e7c8457 SHA256: f0c60f62ef9ffc044d0b4aeb8cc26b971236f24a2611cb1be09ff4845c3841bc * Adds 32-bit implementation of CVE-2018-8453 exploit * Removes console debug logging * Changes the REvil registry root key to SOFTWARE\recfg * Removes the System/Impersonation success requirement for encrypting network mapped drives * Adds a "wipe" key to the configuration for optional folder wiping * Fully implements the background image setting and leverages values defined in the "img" configuration key * Adds an EXT variable placeholder to the ransom note to support UID, KEY, and EXT * Implements URI path building so encrypted system data is sent to a C2 pseudo-random URL * Fixes the function that returns the victim's username so the correct value is placed in the stats JSON data ------------------------------------ REvil 1.01 MD5: 2abff29b4d87f30f011874b6e98959e9 SHA1: 9d1b61b1cba411ee6d4664ba2561fa59cdb0732c SHA256: a88e2857a2f3922b44247316642f08ba8665185297e3cd958bbd22a83f380feb * Removes the exp/privilege escalation requirement for full execution and encrypts data regardless of privilege level * Makes encryption of network mapped drives optional by adding the "-nolan" argument ------------------------------------ REvil 1.02 MD5: 4af953b20f3a1f165e7cf31d6156c035 SHA1: b859de5ffcb90e4ca8e304d81a4f81e8785bb299 SHA256: 89d80016ff4c6600e8dd8cfad1fa6912af4d21c5457b4e9866d1796939b48dc4 * Enhances whitelisting validation by adding inspection of GetUserDefaultUILanguage and GetSystemDefaultUILanguage * Partially implements "lock file" logic by generating a lock filename based on the first four bytes of the Base64-decoded pk key, appending a .lock file extension, and adding the filename to the list of whitelisted files in the REvil configuration (It does not appear that this value is referenced after it is created and stored in memory. There is no evidence that a lock file is dropped to disk.) * Enhances folder whitelisting logic that take special considerations if the folder is associated with "program files" directories * Hard-codes whitelisting of all direct content within the Program Files or Program Files x86 directories * Hard-codes whitelisting of "sql" subfolders within program files * Encrypts program files sub-folders that does not contain "sql" in the path * Compares other folders to the list of whitelisted folders specified in the REvil configuration to determine if they are whitelisted * Encodes stored strings used for URI building within the binary and decodes them in memory right before use * Introduces a REvil registry root key "sub_key" registry value containing the attacker's public key ------------------------------------ REvil 1.03 MD5: 3cae02306a95564b1fff4ea45a7dfc00 SHA1: 0ce2cae5287a64138d273007b34933362901783d SHA256: 78fa32f179224c46ae81252c841e75ee4e80b57e6b026d0a05bb07d34ec37bbf * Removes lock file logic that was partially implemented in 1.02 * Leverages WMI to continuously monitor for and kill newly launched processes whose names are listed in the prc configuration key (Previous versions performed this action once.) * Encodes stored shellcode * Adds the -path argument: * Does not wipe folders (even if wipe == true) * Does not set desktop background * Does not contact the C2 server (even if net == true) * Encrypts files in the specified folder and drops the ransom note * Changes the REvil registry root key to SOFTWARE\QtProject\OrganizationDefaults * Changes registry key values from --> to: * sub_key --> pvg * pk_key --> sxsP * sk_key --> BDDC8 * 0_key --> f7gVD7 * rnd_ext --> Xu7Nnkd * stat --> sMMnxpgk ------------------------------------ REvil 1.04 MD5: 6e3efb83299d800edf1624ecbc0665e7 SHA1: 0bd22f204c5373f1a22d9a02c59f69f354a2cc0d SHA256: 2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6 * Leverages PowerShell and WMI to delete shadow copies if the victim's operating system is newer than Windows XP (For Windows XP or older, it uses the original command that was executed in all previous REvil versions.) * Removes the folder wipe capability * Changes the REvil registry root key to SOFTWARE\GitForWindows * Changes registry key values from --> to: * pvg --> QPM * sxsP --> cMtS * BDDC8 --> WGg7j * f7gVD7 --> zbhs8h * Xu7Nnkd --> H85TP10 * sMMnxpgk --> GCZg2PXD ------------------------------------ REvil v1.05 MD5: cfefcc2edc5c54c74b76e7d1d29e69b2 SHA1: 7423c57db390def08154b77e2b5e043d92d320c7 SHA256: e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea * Add new 'arn' configuration key that contains a boolean true/false value that controls whether or not to implement persistence. * Implements persistence functionality via registry Run key. Data for value is set to the full path and filename of the currently running executable. The executable is never moved into any 'working directory' such as %AppData% or %TEMP% as part of the persistence setup. The Reg Value used is the hardcoded value of 'lNOWZyAWVv' : * SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lNOWZyAWVv * Before exiting, REvil sets up its malicious executable to be deleted upon reboot by issuing a call to MoveFileExW and setting the destination to NULL and the flags to 4 (MOVEFILE_DELAY_UNTIL_REBOOT). This breaks persistence however as the target executable specified in the Run key will no longer exist once this is done. * Changes registry key values from --> to: * QPM --> tgE * cMtS --> 8K09 * WGg7j --> xMtNc * zbhs8h --> CTgE4a * H85TP10 --> oE5bZg0 * GCZg2PXD --> DC408Qp4 ------------------------------------ REvil v1.06 MD5: 65ff37973426c09b9ff95f354e62959e SHA1: b53bc09cfbd292af7b3609734a99d101bd24d77e SHA256: 0e37d9d0a7441a98119eb1361a0605042c4db0e8369b54ba26e6ba08d9b62f1e * Updated string decoding function to break existing yara rules. Likely the result of the blog posted by us. * Modified handling of network file encryption. Now explicitly passes every possible "Scope" constant to the WNetOpenEnum function when looking for files to encrypt. It also changed the 'Resource Type" from RESOURCETYPE_DISK to RESOURCETYPE_ANY which will now include things like mapped printers. * Persistence registry value changed from 'lNOWZyAWVv' to 'sNpEShi30R' * Changes registry key values from --> to: * tgE --> 73g * 8K09 --> vTGj * xMtNc --> Q7PZe * CTgE4a --> BuCrIp * oE5bZg0 --> lcZd7OY * DC408Qp4 --> sLF86MWC ------------------------------------ REvil v1.07 MD5: ea4cae3d6d8150215a4d90593a4c30f2 SHA1: 8dcbcbefaedf5675b170af3fd44db93ad864894e SHA256: 6a2bd52a5d68a7250d1de481dcce91a32f54824c1c540f0a040d05f757220cd3 TBD

parsing : enabled

Links

Page title Available Last visit URL Screen
404 Not Found
⬇️
2022-08-19
http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ Screen
404 Not Found
⬇️
2022-08-19
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/ Screen
Blog
⬇️
2023-01-06
http://blogxxu75w63ujqarv476otld7cyjkq4yoswzt4ijadkjwvg3vrvd5yd.onion/Blog Screen
⬇️
Never
http://2wub3njb7zvmnn6xohbuizjcbvy4w5dvlb4puesry3rrl6gx4452ezid.onion
⬇️
Never
http://54xj22qsftuzs6bhcistgz27reblgijdjggkgb3fdhfgl3ghkmzk7dad.onion
⬇️
Never
http://65x5syrn4gmgfnicrhyfwkokw5x3xipxer2z4vhhckrh756v6m5272qd.onion
⬇️
Never
http://fsgwyl2xd2h5s43er7epr6vuqu5eddmmtgp6cq7khmkoe3ba4d37w7ad.onion
⬇️
Never
http://rrjwr4jsju3nuwjz77hbcquiuq5hc3oc7yxlgi5rxeazehf7mlkzcvid.onion
⬇️
Never
http://ttn4gqpgvyy6tuezexxhwiukmm2t6zzawj6p3w3jprve36f43zxr24qd.onion
None
⬇️
Never
http://landxxeaf2hoyl2jvcwuazypt6imcsbmhb7kx3x33yhparvtmkatpaad.onion/

Rhysida

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Rhysida
⬆️
2025-08-20
http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/ Screen
⬆️
2025-08-20
http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/archive.php Screen
⬆️
2025-08-20
http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/archive.php?auction Screen
Rhysida
⬆️
2025-08-20
http://rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion/ Screen
Onionsite Not Found
⬆️
2025-08-20
http://rhysidaeoxtkejwuheks3a7htk4zn3dfuynt5mqw6oawlcx6kcxjdeyd.onion Screen
Onionsite Not Found
⬇️
2025-08-19
http://rhysidaiqemmlrvn2jvncdwhkvuiv7s2iu342xnrpeynxoe6r2dtjfyd.onion Screen
Onionsite Not Found
⬆️
2025-08-20
http://rhysidaqho36b6i6mvpmy5di4ro5zglovtxixrirky6q3fgack7q5uyd.onion Screen

Risen

Description

Risen, which is a fully optimized and high-speed program, is the result of our years of experience in the field of malware writing. Risen is written in C language and completely using winapi. We produced many products with different features and options, but we came to the conclusion that none of the options have the benefit and efficiency they should; So, instead of spending time on useless and inefficient options, we decided to spend all our time on the strength, speed and security of our cryptography, and that's how we created Risen. Software features in version 1: -Encryption security, utilizing Chacha20 and RSA 2048 algorithms. -High encryption speed and software optimization -compatible with all versions of Windows on any hardware without any issues. -Automatic option settings, its easy to using and default configuration set to the best mode. -Utilization of Threadpool method and queue creation for encryption. -A powerful file unlocker, unlock files without closing processes. -Safe deletion of backups, shadow copies, and all windows logs. -A blog, Leak website, and management panel on TOR for leaking data of non-paying companies.

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://s2wk77h653qn54csf4gp52orhem4y72dgxsquxulf255pcymazeepbyd.onion/
None
⬇️
Never
http://o6pi3u67zyag73ligtsupin5rjkxpfrbofwoxnhimpgpfttxqu7lsuyd.onion
None
⬇️
Never
https://cqqzfmdd2fwshfyic6srf3fxjjigiipqdygosk6sdifstrbtxnm5bead.onion

Robbing Hood

Description

Links

Page title Available Last visit URL Screen
Rocket.Chat
⬇️
2025-06-15
http://fonektibq4fbgergrorw43yawhz3qslkonrwc74j2h2kftcidmf6g6id.onion/ Screen

Robinhood

Description

Links

Page title Available Last visit URL Screen
Trending topics on Tumblr
⬆️
2025-08-20
https://robinhoodleaks.tumblr.com Screen

Rook

Description

Ransomware.

Links

Page title Available Last visit URL Screen
We Are Rook!!!
⬇️
2022-01-25
http://gamol6n6p2p4c3ad7gxmx3ur7wwdwlywebo2azv3vv5qlmjmole2zbyd.onion

Royal

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Royal
⬇️
2023-10-16
http://royal2xthig3ou5hd7zsliqagy6yygk2cdelaxtni2fyad6dpmpxedid.onion Screen
Royal
⬇️
2023-10-16
http://royal4ezp7xrbakkus3oofjw6gszrohpodmdnfbe5e4w3og5sm7vb3qd.onion Screen
None
⬇️
Never
http://72u5vd67xdff354hhge6wjuvsixxwo3c6bvrdlqstgmjfptpbzwrsmad.onion
None
⬇️
Never
http://k6s24pz55gtvtzzpg4riv7zb74vts425bl42zrpmice5ud3a65itj6ad.onion/
None
⬇️
Never
http://yef4xoqj2jq554rqetf2ikmpdtewdlbnx5xrtjtjqaotvfw77ipb6pad.onion/

Rransom

Links

Page title Available Last visit URL Screen
code-server login
⬇️
2023-07-12
http://t2tqvp4pctcr7vxhgz5yd5x4ino5tw7jzs3whbntxirhp32djhi7q3id.onion Screen

Rtm Locker

Description

Links

Page title Available Last visit URL Screen
Вход | Read The Manual
⬆️
2025-08-20
http://nv4addu4insb7x6aagdv6r5gvxzczgfje7mmecsjonnrvsq7ulevvfid.onion Screen
403 Forbidden
⬇️
2025-08-20
http://3wugtklp46ufx7dnr6j5cd6ate7wnvnivsyvwuni7hqcqt7hm5r72nid.onion/ Screen

Run Some Wares

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Run Some Wares
⬆️
2025-08-20
http://rnsmwareartse3m4hjsumjf222pnka6gad26cqxqmbjvevhbnym5p6ad.onion/ Screen
404 Not Found
⬇️
2025-04-19
http://nidzkoszg57upoq7wcalm2xxeh4i6uumh36axsnqnj3i7lep5uhkehyd.onion/ Screen
404 Not Found
⬇️
2025-04-19
http://oow7rehrxlzpy6vh3hezl2khstkpa6s7wx3iit74tr6xbjibupld5iad.onion/ Screen
Index of /
⬇️
2025-06-07
http://cvbu44wmzzslykypqkk3utdvrrdenrf5knvyrshhcvosfxa2un4tqrid.onion/ Screen
403 Forbidden
⬆️
2025-08-20
http://vnoa7t4c3wr6himmurl4it3ctvgmm6munjknuztqlu4nbz34367vokyd.onion Screen
None
⬇️
Never
https://lmsxwm6hrd5osuefl6uia3wwnxxnlav2ce4d4nkjvuonb3426pwdmcad.onion

Sabbath

Links

Page title Available Last visit URL Screen
BLOG
⬇️
2021-11-13
http://54bb47h5qu4k7l4d7v5ix3i6ak6elysn3net4by4ihmvrhu7cvbskoqd.onion/blog
Welcome page
⬆️
2025-08-20
http://54bb47h.blog Screen

Safepay

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
Never
http://nj5qix45sxnl4h4og6hcgwengg2oqloj3c2rhc6dpwiofx3jbivcs6qd.onion
SAFEPAY
⬇️
2025-06-17
http://nz4z6ruzcekriti5cjjiiylzvrmysyqwibxztk6voem4trtx7gstpjid.onion Screen
⬇️
2025-06-21
http://qkzxzeabulbbaevqkoy2ew4nukakbi4etnnkcyo3avhwu7ih7cql4gyd.onion/ Screen
⬇️
2025-06-21
http://iieavvi4wtiuijas3zw4w54a5n2srnccm2fcb3jcrvbb7ap5tfphw6ad.onion/ Screen
Welcome to nginx!
⬇️
2025-03-04
http://fcde4o7iquaspdbo5yetwqn3rfueet2zfy3wjosrc5dznyccwbiz6oyd.onion/ Screen
403 Forbidden
⬇️
2025-08-18
http://crmbcdcdwoex6dzajbicgzrsuw2t76pomajwdpi2mb2babbfdgcc6xid.onion/ Screen
SAFEPAY
⬆️
2025-08-20
http://j3dp6okmaklajrsk6zljl5sfa2vpui7j2w6cwmhmmqhab6frdfbphhid.onion/ Screen
Access denied
⬆️
2025-08-20
http://wmgres25e43uwgebctgofo2qe23kf5vqevixiulubpovdglyizfugryd.onion/ Screen
⬇️
Never
http://dgcg5ncjab6scb7fnk7gx5php4lbpxjy2jjnu3apnkxyippqf6yhw3ad.onion
⬇️
Never
http://oxly5vxvvhi5fv5vsvj3kvlqeprbijitycqisylaxzf324bn7e4qr2ad.onion
⬇️
Never
tonsite://safepay.ton
Safepay Blog
⬆️
2025-08-20
http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/ Screen

Samsam

Links

Page title Available Last visit URL Screen

Sarcoma

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Sarcoma Group
⬆️
2025-08-20
http://sarcomawmawlhov7o5mdhz4eszxxlkyaoiyiy2b5iwxnds2dmb4jakad.onion Screen
Index of /
⬇️
2025-08-19
http://bi32pq7y3gqq3qacgvamnk2s2elnppvevqp325wtk2wo7vh2zavjcfid.onion/ Screen
Index of /
⬇️
2025-08-19
http://54yjkjwjqbm74nchm6o6b4l775ws2hgesdopus5jvo3jx6ftj7zn7mid.onion/ Screen
Index of /
⬇️
2025-08-19
http://ngvvafvhfgwknj63ivqjqdxc7b5fyedo67zshblipo5a2zuair5t4nid.onion/ Screen
Index of /
⬇️
2025-08-19
http://icmghe66zl4twvbv5g4h532mogcea44hrkxtotrlx6aia5jslnnbnxad.onion/ Screen
Index of /
⬇️
2025-08-19
http://lyz3i74psw6vkuxdjhkyxzy3226775qpzs6oage4zw6qj66ppdxma2qd.onion/ Screen
Index of /
⬇️
2025-08-19
http://55lfxollcks2pvxbtg73vrpl3i7x4jnnrxfl6al6viamwngqlu4cxgyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://modre6n4hqm4seip2thhbjcfkcdcljhec7ekvd5qt7m7fhimpc2446qd.onion/ Screen
Index of /
⬇️
2025-08-19
http://r3yes535gjsi2puoz2bvssl3ewygcfgwoji6wdk3grj3baexn2hha2id.onion/ Screen
Index of /
⬇️
2025-08-19
http://pauppf2nuoqxwwqqshaehbkj54debl7bppacfm5h6z6zjoiejifezhad.onion/ Screen
Index of /
⬇️
2025-08-19
http://iiobxrljnmjwb6l66bfvhin5zxbghbgiv6yamqpb4bezlrxd2vhetgyd.onion/ Screen
Index of /
⬇️
2025-03-22
http://nf5b6a4b4s623wfxkveibjmwwpqjm536t5tyrbtrw7vsdqepsdoejoad.onion/ Screen
Index of /
⬇️
2025-08-19
http://rs3icoalw6bdgedspnmt6vp2dzzuyqxtccezmta2g5mlyao64len7dyd.onion/ Screen
Index of /
⬇️
2025-02-14
http://lpp4aze237qkkursbtesd54ofag6te5i5lzpee5a3buhq4v3uwtxnlqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://6nwhpuwtf4onxvr7el5ycc4xwefhk4w6q6rbn23oe2ghax2x7nns3iad.onion/ Screen
Index of /
⬇️
2025-08-19
http://7usqkx3whuqipzsolnctey7xgszixv446vam7et2qas6xmuxtjm54pad.onion/ Screen
Index of /
⬇️
2025-08-19
http://jck4dycheanyy6zrolymheurxak54o53lzg3hfcz7ao35hs7fewsaoyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://wi5q5npnch6fy5y7m4jtjznrydzyhtp6ik4j5swrdsehdwtvv3akleqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://tlntayu7wbtcqxtumbqh4x2vzurw7ybpuhtozusbxuqggcwmnisd7vid.onion/ Screen
Index of /
⬇️
2025-08-19
http://ycgedgigkqoeabmpnpwwbqojcgldekrjraaeeo4litevj5bvp7dtmrid.onion/ Screen
Index of /
⬇️
2025-08-19
http://tr2w7zxx2clrckh4mr6aupyennkngrz2bfuohpdzeifajgeqg6rtxxyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://tg6cr3uyeakbug6jt4oeaxbcpu4urdpm7ksk6uk7sdwg3walnqcwftqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://4b2njxftjecmzgyafn46dcyibnv3mourddcfq7qxdylkov4bisjl7xqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://fijqvpzptg2sxavr3s6vw32lx4xdfa3i2oedi4574qo3apqyhd7srwad.onion/ Screen
Index of /
⬇️
2025-01-14
http://twm7i3mxyydc2ew5ppbmjiz6rzww7ze32t2ecmznnsywdccwatzjxead.onion/ Screen
Index of /
⬇️
2025-08-19
http://qysbb5qdwpxsimtrsbehqc75q4b2lw6m4imtnswgmbsq2mw4ulvxevqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://fbrmzvj2c6a5soanvuw3qi4dpnt3rcgte32nae4qegd4vqpnjtrwbqid.onion/ Screen
Index of /
⬇️
2025-08-19
http://6v3lslpnsfae4rfghnl473u4hp7j6yyu74pipyks54norp4filkzjgid.onion/ Screen
Index of /
⬇️
2025-08-19
http://l2atrqqwpmgdr4vzae7ufgulirsklfk4xmierg4ihdxborjkpyuz5lyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://yry66r4til42vxubkqpy5wo75mshv7pcaqtbg4rzl55bs55yzav73uyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://7h422j3rpt7dxoeijbzn6xo7t43dmaisl5t44mcsf6ulbj3weg6doqyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://4x2dnydjwfpa4zgutwqaeqxd7tmdz452ttvvq5pga5eqgppi2uu5chyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://ufwlfce4qkiqsda7e2mhaibgyyi6jfjhu55j7uoq6bh3kmue7pc34iid.onion/ Screen
Index of /
⬇️
2025-08-19
http://tfeijfoxmvqcoqjz2nvgfblxge27fyiy2k2fshiiccyrdz4kfiwaziid.onion/ Screen
Index of /
⬇️
2025-08-19
http://cth3pse7mszuess3jeiftdawcqcm7cvwrrx7hiwi7zxzh55jvh6f42id.onion/ Screen
Index of /
⬇️
2025-08-19
http://zyzmgujsdh4xjmxjf4j6riqn4s52jfpiurcpabk5uxfitmz4pusaueqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://lq72f4y2gbujxypmicycfpmmtv74tazt4h6szumrniuvgxwkwi4ykcyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://i44esri5nzpdcanpgflcrlxk4tmf7yfpxkcysha3gblsuiswyyxmi3qd.onion/ Screen
Index of /
⬇️
2025-08-19
http://t3ym2cemf625rd5slz5ifp2jz2ldntmlbn74i5joebg6c74fmnpmuyqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://hh4ueveki3serlpuvt63lp557z5qhlfwlc32bclw4x53dmt3ijoewmqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://5ka4wjkv3qulsn6gtfzyhumafgupipu6rkfezf2tw2doveamaqqmxvyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://ibrdo3v56w6veyp6moi7iaadtk6o4qa6eyppc3svinph4vx5qrllpzid.onion/ Screen
Index of /
⬇️
2025-08-19
http://rsrcywwt7b53kw2lsioilnfrrs2lixt4nttzpcli74fjvfk4kqbfh5qd.onion/ Screen
Index of /
⬇️
2025-08-19
http://pcgkekcyyzl465rqt4mpezjkjdkoxgb7c4j6nbb6rn4gnw7zme24lrad.onion/ Screen
Index of /
⬇️
2025-08-19
http://g7vfmyo2xvt4uwoypgb675rcgxokwdxqevmx5ie5qojqnkuvnuudemqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://zaie6jcetdtqhi5epab45wzginog4kuo4sx4nwr4ydkdby76b5ri3xqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://4eahz4i6cjqychvmiyqjducmhu3pep6l52vaw3ik3nizzpt5writuryd.onion/ Screen
Index of /
⬇️
2025-08-19
http://herbgxwb46z3pikyy6h6wckbjebg4ytuoijqceu2wsse4nh5tyuqqxqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://63qnrvuxwl3jkzqik33ppgvktytzy5vasmp5yyhkv4mzbv5enuc5pqqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://cqjqlbmmfqanj6ctywkmgzi7iythgc6atu2xgjbkk2ccr465gizolqqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://mtd2ltbdnsudzaneia6i6xgwkpn7adxfuesqstrreyqxlgxbxejpojid.onion/ Screen
Index of /
⬇️
2025-08-19
http://wsl6ouwdqk62yhddt2rvy6i7jzdegbufklfp6hdpgxn6vmwqlsqy23id.onion/ Screen
Index of /
⬇️
2025-08-19
http://n4axoeoemdqamjhicytqnebburiwbmvviqyltoqtljoancodgijw32yd.onion/ Screen
Index of /
⬇️
2025-08-19
http://lqlkfdi2ydpzibk4xpikfvae3bjdd4lsodgwtpunxfc6abkexsg5a2ad.onion/ Screen
Index of /
⬇️
2025-08-19
http://jq6vxgpnjfs3ue2wn7ve4bnga4ewkcetpvkmz324se7mlqjtnrenkqad.onion/ Screen
Index of /
⬇️
2025-08-19
http://qhzy4ur5atch5orjkd2h3x34kwqbswqzqnllaij4crl3v2mnrj7aouyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://tzmfdwducfvlh6ie4juo6ovgft3qwxgf5q7dxca57fqalpn6zsed3lad.onion/ Screen
Index of /
⬇️
2025-08-19
http://jdphsfcjuyog5cgtjdfsxluarkvqy5rw75kasoj6kuihga3bs3fwgfyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://wphvg3uizhfblnuuwyz35nhfpgz254lj3iwd2jrtl2oce6qvmlwpl2id.onion/ Screen
Index of /
⬇️
2025-08-19
http://bpcxhnyo4rvobiiapjksmzog4lr7gchwfoygqtphzfspbsxdp2lutcad.onion/ Screen
404 Not Found
⬇️
2025-08-19
http://6hfobqn3vj2yyjgvgkklftppf3una73dn6am7gpieohkryzg6avr5dqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://igqsxlg2ndj7xmaepxtvkisacskrb3mbhlcgymis42h6l6qyfyjyg7id.onion/ Screen
Index of /
⬇️
2025-08-19
http://iz62i5obz6mwixyjwxggbw7fk6wdgmmy4ancvynpbqqmgwpnghv3rdid.onion/ Screen
Index of /
⬇️
2025-08-19
http://riuxxxbufgx5z53gww432mf5jvh2o7mfh22hvmpdw4ksutd6dflj7byd.onion/ Screen
Index of /
⬇️
2025-08-19
http://zrqe3dtolmluwzbwgktss4habzra3yv67kc35zhoccyj57xf5kuo4ead.onion/ Screen
Index of /
⬇️
2025-08-19
http://pgyarykjxofanc7x37qx6am6me4geeebiqh76fslda5jshhup4yljvyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://ykg6a32ed546jveyot236w6cst5xahji4bhnxx4qv6b7wdqrwa3rhmqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://plvvaggo6jjl2wy5dixn2knj4kuypquxfauijigke6qtx3ixjfitglid.onion/ Screen
Index of /
⬇️
2025-08-19
http://sgwmhbj7y2hehzzkt6fwvj23gjkzsvvhae2f3haavxjbi35tibnhpayd.onion/ Screen
Index of /
⬇️
2025-08-19
http://67f7qjjoez6fnnrjuqzg4yqjiowvjbe5y2dhmjkiwubtqzj3isc5joid.onion/ Screen
Index of /
⬇️
2025-08-19
http://tszizx6qdi4uva2jbfg5z2mhdaqh3iduk57obi7hg4m6omta3aymrzad.onion/ Screen
Index of /
⬇️
2025-08-19
http://uhf6vmrgiqsvytiunb3tustswyhc2nz5aiax3viusb6i2v427pncylqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://j4swv3longylj4ljjdny4yino4xwvrbis5ouxg4anlg4el6kjku7dbqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://dyr566jtgcsyk7si5gn7unygj3pnzgxfwvlureyn3dfi7g7r2ve54zad.onion/ Screen
Index of /
⬇️
2025-08-19
http://r33gr3wmjrsyo3t5tc6j3yzdtsjhmyzd6xielw6ceu2zr3najset5iad.onion/ Screen
Index of /
⬇️
2025-08-19
http://amffvuxv5qyi7fwh5cfoehkr4yrp3ushi4qzxm76ahiwro7dequcoxyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://mx5a6zo2vzhnnuazxz5fqwacwd7wnkbxziwty3gedipkbvfn3ngdniid.onion/ Screen
Index of /
⬇️
2025-08-19
http://p6b2xarot2rng6v6unlb72jtydw7tklqtyrsrhg6jdr5gaass5uk2vad.onion/ Screen
Sarcoma Group
⬇️
2025-05-21
http://sarcomabwgzv7ogiulwqfmlul6mjcxy6o3owuld4lqguvevf4kgp3lqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://mjlfzles4bszxnxcjktdu6iujjc7bhui62fc6s5z736jjsaq4zcq4cad.onion/ Screen
Index of /
⬇️
2025-08-19
http://2pxacmry7fqmbhkuseo2l3rxmyw24ctmengat7hlavlgrcixbepz6aqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://g3adubh3fjsy5ezrmxmy4wxt7dvkhxnkd5deaac47mryvkzvzcf2tvid.onion/ Screen
Index of /
⬇️
2025-08-19
http://lhc2ghpebf2d5w3qroiphzjnwwbi6oyigt3aztgghy43q7j2vnu3bcad.onion/ Screen
Index of /
⬇️
2025-08-19
http://hpugjgammwixig4kpti5r67ofjd4qrgkjohbth2irq4nvcv3m7s76tyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://qxbuog46z72pycrwfaedafqy5dodyrt46ucfs4p5vaaigxtudtwerpyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://y2vv2zvegnvv7uwr5saye4enthgq3ghlhomu5a3nshgwih4phn6qusyd.onion/ Screen
Index of /
⬇️
2025-08-19
http://areaucod7knfvyl2xbnezcucezcwr4iku5psrt74zthoyqegdzqsxzad.onion/ Screen
Index of /
⬇️
2025-08-19
http://2fcn6dfc4li6kdt7dhqv4rpnmao64txxwcniostcvw6obdw74hiqtkqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://f22licvnajbisahwc73y55se6mgmvxuups2mp7t43jgs4yj7dp6igqad.onion/ Screen
Index of /
⬇️
2025-08-19
http://rlwqssdty3mmlxla2h4iviv32qtig54nxw7ww3wt2bmxp74a3qmo75ad.onion/ Screen
Index of /
⬇️
2025-08-19
http://krxmjef2yd7dwmxbgghooskep4kcecxtqqs3iu33evi7dvr5oc3dpkid.onion/ Screen
Index of /
⬇️
2025-08-19
http://3mwyz2wt6b6zuah5y3eyjmsjkhaowiv6ejqodt2ly4y4rpwcggii65id.onion/ Screen
Index of /
⬇️
2025-08-19
http://lm7o3nfplejz7jibisw7wwrivlmske4rq6vofvbncl7g7jflvd3ubqid.onion/ Screen
Index of /
⬇️
2025-08-19
http://zgu66qoreyw4tx7bmtus6gcz7at5ufiqhgyswfnprbwvpcjw4mows7id.onion/ Screen
Index of /
⬇️
2025-08-19
http://xik5pf7gejiffbapos223f4q7l5pdwv6xwag6irgkltx2lu6wfnglaqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://3fdy7qukqwts2j7w7lks75tueaokjsmotcshzmxjqeojca26s3doocad.onion/ Screen
Index of /
⬇️
2025-08-19
http://vysjfhy5gpr2f4p6amiamjo36emgbyh3xelsxg6sudisdfwtfor4rjqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://tbkqp6pbl7uq2ymiii2jqzbre5igk2xtaruzm7fcdtstmufsssekukid.onion/ Screen
Index of /
⬇️
2025-08-19
http://nzqvpyyznsn4c3ubidcpywr5iqtnjn3lkcsafnjtsmozowmbjforgeqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://isxttzwtr7havmbj2qmyb7stwmrds32ye42iwc7kxj55adbexdnbfoqd.onion/ Screen
Index of /
⬇️
2025-08-19
http://m7k6jgadomd3nd2mor5sefnuowtwktfjvzihydx6zy2tkohv6aatr3ad.onion/ Screen
Index of /
⬆️
2025-08-20
http://cgewcqt4x7kb7xgkfu2r3yv5wifzvpx6tojonay3kdgs5tqpjvkd5bqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://lq4acyymyobtq7tafyspo7zlm4bwnmpyyknbtb3zefq2zdy3xxiu5nad.onion/ Screen
Index of /
⬆️
2025-08-20
http://sbgsnuet6t7kle4tfmgsvgebaqgxab3lrslg6vjeabphzq7jx5232byd.onion/ Screen
Index of /
⬆️
2025-08-20
http://qccbb75hak6ze6rsm344rx73lh7rk6caha2hvleyopejhtgagxjyioqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://73jrahivyj7cydl3qeiauwm4fkz4f7e4d3deny6qt3cgtwxmkj2vmiyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://enfxn727mx4ue55zgbjkogn3lnb57e5ed7bcooodxsajzsp3dyo5xeyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://4tgkspsiob5zg7vwqmmbquymoj3sacpx4x4qixvgzukjfen4ck4s6mad.onion/ Screen
Index of /
⬆️
2025-08-20
http://hqzjmm4qg2q2utn2e3yqt5lsnrabjmi5m4o547v4jp3pi2hwp2tkunid.onion/ Screen
Index of /
⬆️
2025-08-20
http://nfh5wuh4gvbai237npdu672xmx2di2lo7pcwu6th2a7kzgue2fnhhdad.onion/ Screen
Index of /
⬆️
2025-08-20
http://5q3lywcjrujw3vao7cz3ruqd57ugfdcu3qiisklpqillvuidl5wiqlqd.onion/ Screen
Index of /
⬆️
2025-08-20
http://zp6bziy6wljpkg6i3uxzzcxyajodxzoc7acf5egb2vhzzrot23y3mpyd.onion/ Screen
Index of /
⬆️
2025-08-20
http://45k4wju2hwdywn3bsgs6mb6izppx6ghq5w3abcp77jz36xnu7sirltid.onion/ Screen

Satancd

Description

Links

Page title Available Last visit URL Screen
Server Under Maintenance
⬆️
2025-08-20
http://mzg4llxp4kaf4qq5s4hlentf45rjda3mzev3j6hlh2endarc2k6z6oyd.onion/satancd-room Screen

Satanlock

Description

Connected to GD Lockersec and Babuk-Bjorka. Group is aka SalanLock (from typo on victim pages).

parsing : enabled

Links

Page title Available Last visit URL Screen
satanLock Blog
⬇️
2025-04-25
http://212.24.99.211 Screen
satanLock Blog
⬇️
2025-04-25
http://5g2e.l.time4vps.cloud/ Screen
⬇️
Never
http://mgeegnexyhhn5dpqewihjy33qyhng3gy66h3fogiwefl5hljhtmfznad.onion/
None
⬇️
Never
http://2hxbnjzuymvdca4buxlyu4eolz4mbbxw2cnpibbb2od7z77y76di7cad.onion/
None
⬇️
Never
http://satanlock2p4c3ad7gxmx3ur7wwdwlywebo2azv3vv5qlmjmole2zbyd.onion
SatanLock V2 Leaks
⬆️
2025-08-20
http://tzhwmgguyxrg6q3tu4q3gvopcjynrhw6ryx2bdl5ghisdkyunfua5xyd.onion/ Screen
SatanLock V2 Leaks
⬇️
2025-07-07
http://42fybwnnv2t6fykirmgxpwvvfidgnfmegrz4lpi3vskivfid7z7kqyqd.onion/ Screen

Scarab

Links

Page title Available Last visit URL Screen

Schoolboys

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://pnanlicgxkku2aonwsg2fwid3maycsso7joqnzp66wkfemzdk7ahsdid.onion/

Secp0

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
SECP0 News
⬇️
2025-08-20
http://secponewsxgrlnirowclps2kllzaotaf5w2bsvktdnz4qhjr2jnwvvyd.onion/ Screen
SECP0 News
⬇️
2025-05-15
https://secp0-news.net/ Screen
SECP0 News - /files/12b3429e1124122e/
⬆️
2025-08-20
http://secponewsxgrlnirowclps2kllzaotaf5w2bsvktdnz4qhjr2jnwvvyd.onion/files/12b3429e1124122e/ Screen
404 Not Found
⬆️
2025-08-20
http://bhn2xz5jer2xeibxjzhgfp7qclttnbvkkvd4hvlmjbnz66jxq7yzn6ad.onion/ Screen
404 Not Found
⬆️
2025-08-20
http://2a6w667vebiebciji7vm3vj43svegvozoqypttdgojzgdcbnfsu5wiid.onion/ Screen
None
⬇️
Never
https://secp0-support.net/
404 Not Found
⬆️
2025-08-20
https://secp0-support.cfd/ Screen
SECP0 News
⬇️
2025-08-20
https://secp0-news.ws/ Screen

Sekhmet

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://sekhmetleaks.top/
None
⬇️
Never
http://rlmuybcg5h5gaatr.onion/

Sensayq

parsing : enabled

Links

Page title Available Last visit URL Screen
SenSayQ
⬇️
2024-08-05
http://gmixcebhni6c3kcf5m7xxybomaphj7pizoqtxiqmrz5wsh6g6x5s2wqd.onion/ Screen
None
⬇️
Never
http://ppzmaodrgtg7r6zcputdlaqfliubmmjpo4u56l3ayckut3nyvw6dyayd.onion/

Shade

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://cryptorz76e7vuik.onion

Shadow

Links

Page title Available Last visit URL Screen
DuckDuckGo — Privacy, simplified.
⬇️
2023-09-06
http://lc65fb3wrvox6xlyn4hklwjcojau55diqxxylqs4qsfng23ftzijnxad.onion Screen

Sharpboys

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://sharpboyz.io/

Siegedsec

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2024-03-25
http://nv5p2mmpctvyqdyyi5zwh4gnifq2uxdx4etvnmaheqlrw6ordrjwxryd.onion/ Screen

Sifrecikis

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://sifrecikx7s62cjv.onion/

Silent

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Silent Blog
⬆️
2025-08-20
http://silentbgdghp3zeldwpumnwabglreql7jcffhx5vqkvtf2lshc4n5zid.onion/ Screen
⬇️
Never
http://jf2zjpxfh3sob5xr6uc53k7rt4y4vl6rt6bdynd3ptuv4cu5yi43elad.onion/

Silent Ransom

Links

Page title Available Last visit URL Screen

Sinobi

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Sinobi
⬆️
2025-08-20
http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks Screen
Sinobi
⬆️
2025-08-20
http://sinobi6rlec6f2bgn6rd72xo7hvds4a5ajiu2if4oub2sut7fg3gomqd.onion/leaks Screen
Sinobi
⬆️
2025-08-20
http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks Screen
Sinobi
⬆️
2025-08-20
http://sinobi7l3wet3uqn4cagjiessuomv75aw3bvgah4jpj43od7xndb7kad.onion/leaks Screen
Sinobi
⬇️
2025-08-20
http://sinobi7sukclb3ygtorysbtrodgdbnrmgbhov45rwzipubbzhiu5jvqd.onion/leaks Screen
Sinobi
⬆️
2025-08-20
http://sinobi23i75c3znmqqxxyuzqvhxnjsar7actgvc4nqeuhgcn5yvz3zqd.onion/leaks Screen
Sinobi
⬆️
2025-08-20
http://sinobia6mw6ht2wcdjphessyzpy7ph2y4dyqbd74bgobgju4ybytmkqd.onion/leaks Screen
Sinobi
⬇️
2025-08-20
http://sinobi7yuoppj76qnkwiobwfc2qve2xkv2ckvzyyjblwd7ucpptl62ad.onion/login Screen
Sinobi
⬇️
2025-08-20
http://sinobi57mfegeov2naiufkidlkpze263jtbldokimfjqmk2mye6s4yqd.onion/login Screen
⬇️
Never
http://sinobibdvzohujkliofkxiz3ueyedfh6bed21zjz2z6pafw5jeoptsid.onion/login
Sinobi
⬆️
2025-08-20
http://sinobibjqytwqxjw24zuerqcjyd3hoow6zia7z6kzvwawivamu7nqayd.onion/login Screen
Sinobi
⬆️
2025-08-20
http://sinobicrh73ongfuxjajmlyyhalvkhlcgttxkxaxz3gvsgdcgf76uiqd.onion/login Screen
⬇️
Never
http://sinobidxodgt4jsr3t1mf2rr4okjvvwfp5gh31rqxnowomcx62ssrhqd.onion/login
⬇️
Never
http://sinobiea4snfqtkc43paumapo40i7vxcy5vjzfoalunsnvzehozfhpyd.onion/login
Sinobi
⬆️
2025-08-20
http://blog.sinobi.us.org/leaks Screen
Sinobi
⬆️
2025-08-20
http://chat.sinobi.us.org/ Screen
⬆️
2025-08-20
http://cdn.sinobi.us.org/ Screen
⬇️
2025-08-20
http://sinobihmkmncjubqin5u44vso3z2zongdmmtgle7eglskjmfb6u74rad.onion/ Screen
Sinobi
⬆️
2025-08-20
http://sinobibdvzohujkliofkxiz3ueyedfh6bed2lzjz2z6pafw5jeoptsid.onion Screen
Sinobi
⬆️
2025-08-20
http://sinobidxodgt4jsr3tlmf2rr4okjvvwfp5gh3lrqxnowomcx62ssrhqd.onion Screen
Sinobi
⬆️
2025-08-20
http://sinobiea4snfqtkc43paumapo4oi7vxcy5vjzfoalunsnvzehozfhpyd.onion Screen

Skira Team

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
SKIRA TEAM - Hacking News Main Page
⬇️
2025-05-16
http://mtgc3qvyedjnfu7cen2zsupdppi5ys5g2hm6xwujvoepw25p4dy6huid.onion/news.html Screen

Slam

Description

Links

Page title Available Last visit URL Screen
⬇️
Never
http://encr9djfOJdew92nfjK9sdn34nfsks.onion
⬇️
Never
http://encrKdm13nfKJNdwf7kd.onion
⬇️
Never
http://encr5RhdkjNNJdwq62dfHIUJ7Gdmiu4KdJRvd9md.onion
⬇️
Never
http://encrEjdHGdmd45JdndqkOPqe8jhNdqk.onion
⬇️
Never
http://encrP43djqOIjsq2ndakdkir91dndkqOd34dmaQq71.onion

Slug

parsing : enabled

Links

Page title Available Last visit URL Screen
slug
⬇️
2024-03-11
http://3ytm3d25hfzvbylkxiwyqmpvzys5of7l4pbosm7ol7czlkplgukjq6yd.onion Screen

Snatch

Description

Snatch is a ransomware which infects victims by rebooting the PC into Safe Mode. Most of the existing security protections do not run in Safe Mode so that it the malware can act without expected countermeasures and it can encrypt as many files as it finds. It uses common packers such as UPX to hide its payload.

parsing : enabled

Links

Page title Available Last visit URL Screen
News
⬇️
2023-11-02
http://hl66646wtlp2naoqnhattngigjp5palgqmbwixepcjyq5i534acgqyad.onion Screen
News
⬇️
2022-12-13
https://snatch.press/ Screen
⬇️
2024-09-12
https://snatchteam.cc Screen
Just a moment...
⬇️
2024-12-16
https://snatchnews.top/ Screen
None
⬇️
Never
http://snatch6rpvi7yy4t.onion/
None
⬇️
Never
http://snatch2q72f2wjff.onion/
None
⬇️
Never
http://snatchh5ssxiorrn.onion/
None
⬇️
Never
http://snatch6brk4nfczg.onion/
None
⬇️
Never
http://snatchwezarcr27t.onion/
None
⬇️
Never
http://snatch24uldhpwrm.onion/
⬇️
2025-08-20
http://mydatassuperhero.com/ Screen

Soleenya

Links

Page title Available Last visit URL Screen
Rocket.Chat
⬇️
2025-06-15
http://xzbltrroh4ocknyi7kj2ucjuw63fhyy23dh6lplydl545d33kbygw2id.onion/home Screen

Solidbit

Description

Ransomware, written in .NET.

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://solidb2jco63vbhx4sfimnqmwhtdjk4jbbgq7a24cmzzkfse4rduxgid.onion/login

Space Bears

parsing : enabled

Links

Page title Available Last visit URL Screen
Space Bears
⬆️
2025-08-20
http://5butbkrljkaorg5maepuca25oma7eiwo6a2rlhvkblb4v6mf3ki2ovid.onion/ Screen

Sparta

parsing : enabled

Links

Page title Available Last visit URL Screen
Blog
⬇️
2022-10-01
http://zj2ex44e2b2xi43m2txk4uwi3l55aglsarre7repw7rkfwpj54j46iqd.onion Screen
None
⬇️
Never
http://z33da2c5d6t4ekkv4pxao7znpc2w2m47llzvg76g6xxgyd5wqqmfrtqd.onion

Spectre

Links

Page title Available Last visit URL Screen

Spook

Links

Page title Available Last visit URL Screen
Spook
⬇️
2021-10-26
http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/blog/

Spring

Description

Links

Page title Available Last visit URL Screen

Stormous

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Stormous-ransomware
⬇️
2022-05-09
http://3slz4povugieoi3tw7sblxoowxhbzxeju427cffsst5fo2tizepwatid.onion
......
⬇️
2023-10-01
http://h3reihqb2y7woqdary2g3bmk3apgtxuyhx4j2ftovbhe3l5svev7bdyd.onion Screen
Stormous _ official Site
⬇️
2023-10-01
http://h3reihqb2y7woqdary2g3bmk3apgtxuyhx4j2ftovbhe3l5svev7bdyd.onion/stm.html Screen
StormouS.V4 BLOG
⬇️
2025-08-20
http://pdcizqzjitsgfcgqeyhuee5u6uki6zy5slzioinlhx6xjnsw25irdgqd.onion Screen
Index of /
⬆️
2025-08-20
http://6sf5xa7eso3e3vk46i5tpcqhnlayczztj7zjktzaztlotyy75zs6j7qd.onion Screen

Sugar

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://chat5sqrnzqewampznybomgn4hf2m53tybkarxk4sfaktwt7oqpkcvyd.onion/
None
⬇️
Never
http://sugarpanel.space/advauth_ffma

Suncrypt

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
News
⬇️
2023-05-02
http://x2miyuiwpib2imjr5ykyjngdu7v6vprkkhjltrk4qafymtawey4qzwid.onion/ Screen
None
⬇️
2021-05-01
http://nbzzb6sa6xuura2z.onion

Sundawn

Links

Page title Available Last visit URL Screen

Superblack

Description

Links

Page title Available Last visit URL Screen

Synack

Description

Links

Page title Available Last visit URL Screen
end of game
⬇️
2021-08-18
http://xqkz2rmrqkeqf6sjbrb47jfwnqxcd4o2zvaxxzrpbh2piknms37rw2ad.onion/

Synapse

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://ugoakjk3v6hop3epjhdgn4num43ndb5glgixhraeg2xm455gxqtu2qid.onion

Targetcompany

Links

Page title Available Last visit URL Screen

Taronis

Links

Page title Available Last visit URL Screen

Team Underground

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
SignIn | Chat
⬇️
2023-09-30
http://undgrddapc4reaunnrdrmnagvdelqfvmgycuvilgwb5uxm25sxawaoqd.onion Screen
SignIn | Chat
⬇️
2025-03-05
http://ehehqyhw3iev2vfso4vqs7kcrzltfebe5vbimq62p2ja7pslczs3q6qd.onion/auth/login Screen
All data | Underground store
⬆️
2025-08-20
http://47glxkuxyayqrvugfumgsblrdagvrah7gttfscgzn56eyss5wg3uvmqd.onion/ Screen
SignIn | Chat
⬇️
2025-08-20
http://2nyysjgsfhnwizvbhjeklagbdbjz2z27meao7asl73zcqpb5cr4n4eyd.onion Screen

Teamxxx

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
⬆️
2025-08-20
http://tp5cwh6d2b5hekcg6jlhoe6mawa7dlwiv47epvnfmzuaaur2dnaa3uid.onion/ Screen

Telegram

Links

Page title Available Last visit URL Screen

Termite

parsing : enabled

Links

Page title Available Last visit URL Screen
Termite
⬆️
2025-08-20
http://termiteuslbumdge2zmfmfcsrvmvsfe4gvyudc5j6cdnisnhtftvokid.onion Screen
Index of /
⬇️
2024-12-17
http://pqw3hepvky2pgyyv6dupvx47cm2gxzwop6dfei3i67dj76tdj6alplqd.onion/ Screen
Index of /
⬇️
2025-05-08
http://4xklh64cl2lymm6n5xywinfq4wlchgugvv5a77pm3pta34svnohwl2id.onion/ Screen
Index of /
⬇️
2025-08-20
http://wc4mc3oupskb2c3q4ba6tlf6tq5mdfoevsgfcotbnbsr4tbqoaomftid.onion/ Screen

Thanos

Links

Page title Available Last visit URL Screen

Thor

Description

Links

Page title Available Last visit URL Screen
DuckDuckGo - Protection. Privacy. Peace of mind.
⬇️
2025-06-06
http://g6gwcbiylnvrzj6txsypi72weymzdg6oov2qycu36ggfx3narejcqcid.onion/HNDPXubuzAllW18lBXjT6HU3QnyCtlClvWD8dfcnU6ZUa Screen

Thunder X

Links

Page title Available Last visit URL Screen

Thundercrypt

Links

Page title Available Last visit URL Screen

Tommyleaks

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://xir242nunyist4d7ksfnfmhnjx4gvqbuzo7eax4o3abqjesbxjshh4qd.onion/

Tooda

Description

Members: Eco Ego emo elo user Dante Sevy

Links

Page title Available Last visit URL Screen
Suspected phishing site | Cloudflare
⬆️
2025-08-20
http://tooda.sh Screen

Toxic

Links

Page title Available Last visit URL Screen
Chat
⬇️
2025-02-22
http://cwybfdfhstmmoaxmnz4os7qxdcomnp5qleslqb55vt24vh3kmyl6jmad.onion/ Screen

Trigona

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Blog
⬇️
2023-06-26
http://6n5tfadusp4sarzuxntz34q4ohspiaya2mc6aw6uhlusfqfsdomavyyd.onion Screen
Trigona is Gone
⬇️
2023-10-18
http://trigonax2zb3fw34rbaap4cqep76zofxs53zakrdgcxzq6xzt24l5lqd.onion Screen
404 Not Found
⬇️
2023-10-18
http://trigonax2zb3fw34rbaap4cqep76zofxs53zakrdgcxzq6xzt24l5lqd.onion/api Screen
Blog
⬇️
2024-04-10
http://krsbhaxbki6jr4zvwblvkaqzjkircj7cxf46qt3na5o5sj2hpikbupqd.onion Screen
⬇️
2024-04-10
http://krsbhaxbki6jr4zvwblvkaqzjkircj7cxf46qt3na5o5sj2hpikbupqd.onion/api Screen
Blog
⬇️
2024-03-01
http://zp6la4xdki3irsenq3t7z7pu2nnaktqgob6aizlzjkdiyw6azjeuhzqd.onion Screen
⬇️
Never
http://3x55o3u2b7cjs54eifja5m3ottxntlubhjzt6k6htp5nrocjmsxxh7ad.onion/
⬇️
Never
http://znjkde7j35jed5qqz3sfiv56v6hyfkbluke5ypi2su5vhx2nruswjcad.onion/
⬇️
Never
http://aeey7hxzgl6zowiwhteo5xjbf6sb36tkbn5hptykgmbsjrbiygv4c4id.onion/
⬇️
Never
http://znuzuy4hkjacew5y2q7mo63hufhzzjtsr2bkjetxqjibk4ctfl7jghyd.onion

Trinity

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Trinity
⬆️
2025-08-20
http://txtggyng5euqkyzl2knbejwpm4rlq575jn2egqldu27osbqytrj6ruyd.onion/ Screen
rans
⬆️
2025-08-20
http://txtggyng5euqkyzl2knbejwpm4rlq575jn2egqldu27osbqytrj6ruyd.onion/articles Screen

Trisec

parsing : enabled

Links

Page title Available Last visit URL Screen
404 Not Found
⬇️
2024-04-11
http://orfc3joknhrzscdbuxajypgrvlcawtuagbj7f44ugbosuvavg3dc3zid.onion/victim.html# Screen
Index of /
⬇️
2024-04-11
http://orfc3joknhrzscdbuxajypgrvlcawtuagbj7f44ugbosuvavg3dc3zid.onion/ Screen
Index of /
⬇️
2024-04-11
http://pkk4gbz7lsbgeja6s6iwsan2ce364sqioici65swwt65uhicke65uyid.onion/ Screen
Index of /
⬇️
2024-04-11
http://5qmw6mv5ucbeskd3rv6vgn5dqgsuectmtqvz4paukmvhtlazzkuxuwqd.onion/ Screen
404 Not Found
⬇️
2024-04-11
http://5qmw6mv5ucbeskd3rv6vgn5dqgsuectmtqvz4paukmvhtlazzkuxuwqd.onion/victim.html Screen
404 Not Found
⬇️
2024-04-11
http://pkk4gbz7lsbgeja6s6iwsan2ce364sqioici65swwt65uhicke65uyid.onion/victim.html Screen

Tuborg

Links

Page title Available Last visit URL Screen

Tycoon

Links

Page title Available Last visit URL Screen

U-Bomb

Links

Page title Available Last visit URL Screen
U-bomb
⬇️
2024-08-06
http://contiuevxdgdhn3zl2kubpajtfgqq4ssj2ipv6ujw7fwhggev3rk6hqd.onion Screen

Unknown

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://tdoe2fiiamwkiadhx2a4dfq56ztlqhzl2vckgwmjtoanfaya4kqvvvyd.onion
None
⬇️
Never
http://darktorhvabc652txfc575oendhykqcllb7bh7jhhsjduocdlyzdbmqd.onion/

Unsafe

parsing : enabled

Links

Page title Available Last visit URL Screen
Home | UnSafeBlog
⬇️
2024-04-11
http://unsafeipw6wbkzzmj7yqp7bz6j7ivzynggmwxsm6u2wwfmfqrxqrrhyd.onion/ Screen

V Is Vendetta

parsing : enabled

Links

Page title Available Last visit URL Screen
Vendetta
⬇️
2024-02-08
http://test.cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion Screen

Valencia Leaks

Description

Official twitter account: https://x.com/ValenciaLeaks72

parsing : enabled

Links

Page title Available Last visit URL Screen
Valencia Ransomware
⬇️
2024-10-07
http://6doyqxqqj36vnedtt2zwxmngx52mgyp7brbrtwkyd75jgiolocoybgid.onion/ Screen

Vandev

Links

Page title Available Last visit URL Screen

Vanhelsing

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
VanHelsing Chat
⬇️
2025-05-13
http://vanhelqmjstkvlhrjwzgjzpq422iku6wlggiz5y5r3rmfdeiaj3ljaid.onion/ Screen
VanHelsing Blog
⬇️
2025-05-14
http://vanhelvuuo4k3xsiq626zkqvp6kobc2abry5wowxqysibmqs5yjh4uqd.onion/ Screen
VanHelsing Blog
⬇️
2025-05-14
http://vanhelxjo52qr2ixcmtjayqqrcodkuh36n7uq7q7xj23ggotyr3y72yd.onion/ Screen
VanHelsing Chat
⬇️
2025-05-13
http://vanhelsokskrlaacilyfmtuqqa5haikubsjaokw47f3pt3uoivh6cgad.onion/ Screen
VanHelsing Blog
⬇️
2025-05-14
http://vanhelwmbf2bwzw7gmseg36qqm4ekc5uuhqbsew4eihzcahyq7sukzad.onion/ Screen
VanHelsing Chat
⬇️
2025-05-13
http://vanhelcbxqt4tqie6fuevfng2bsdtxgc7xslo2yo7nitaacdfrlpxnqd.onion/ Screen
VanHelsing Chat
⬇️
2025-05-13
http://vanheltarnbfjhuvggbncniap56dscnzz5yf6yjmxqivqmb5r2gmllad.onion/ Screen
⬇️
Never
http://vanhelln5ly3sw63b5ke25gxvp5rr67wd7rgzezo4mhegm4qpsolbkqd.onion/
⬇️
Never
http://vanhel4wqo425m7rdjolykd22js3hkrvpwld6iyvpjslj63l5ocaqoqd.onion/
⬇️
Never
http://vanhelq3jf5afpkwwlcfm32sdblpfkx2cfa4kxaeoabtnxjpu2qnt7id.onion/

Vanir Group

parsing : enabled

Links

Page title Available Last visit URL Screen
THIS HIDDEN SITE HAS BEEN SEIZED | Vanir Locker Ransomware
⬆️
2025-08-20
http://6xdpj3sb5kekvq5ulym5qqmzsv6ektjgvpmajns3qrafgxtyxrhokfqd.onion Screen
404 Not Found
⬇️
2025-08-20
http://6xdpj3sb5kekvq5ulym5qqmzsv6ektjgvpmajns3qrafgxtyxrhokfqd.onion/assets/index-6d8af759.js Screen

Vasalocker

Links

Page title Available Last visit URL Screen

Vaultcrypt

Description

Links

Page title Available Last visit URL Screen
⬇️
Never
http://restoredz4xpmuqr.onion

Vegalocker

Links

Page title Available Last visit URL Screen

Vfokx

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://vfokxcdzjbpehgit223vzdzwte47l3zcqtafj34qrr26htjo4uf3obid.onion
None
⬇️
2021-05-01
http://746pbrxl7acvrlhzshosye3b3udk4plurpxt2pp27pojfhkkaooqiiqd.onion

Vicesociety

parsing : enabled

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://4hzyuotli6maqa4u.onion
Vice Society - Official Site
⬇️
2023-12-14
http://vsociethok6sbprvevl4dlwbqrzyhxcxaqpvcqt5belwvsuxaxsutyad.onion Screen
Vice Society - Official Site
⬇️
2023-12-14
http://ml3mjpuhnmse4kjij7ggupenw34755y4uj7t742qf7jg5impt5ulhkid.onion/ Screen
Vice Society - Official Site
⬇️
2023-12-14
http://ssq4zimieeanazkzc5ld4v5hdibi2nzwzdibfh5n5w4pw5mcik76lzyd.onion/ Screen
Vice Society - Official Site
⬇️
2023-12-14
http://wmp2rvrkecyx72i3x7ejhyd3yr6fn5uqo7wfus7cz7qnwr6uzhcbrwad.onion Screen
None
⬇️
Never
http://xu66gzit6zp22qvixpenlxu2ok7vzrpqvgkuupkiukpz47va47ewbwad.onion
None
⬇️
Never
http://tahnytazh47jpikpajm2so2jdsjrkx6gfcu4p7bu7u3vfarnpvshgeyd.onion/
None
⬇️
Never
http://ecdmr42a34qovoph557zotkfvth4fsz56twvwgiylstjup4r5bpc4oad.onion/

Vsop

Description

aka Onix/Onyx

parsing : enabled

Links

Page title Available Last visit URL Screen
VSOP NEWS
⬇️
2023-01-02
http://mrdxtxy6vqeqbmb4rvbvueh2kukb3e3mhu3wdothqn7242gztxyzycid.onion/ Screen

Vulcan

Description

Links

Page title Available Last visit URL Screen
Looking for affiliates | VulcanRansomTeam : /d/malware - Dread
⬆️
2025-08-20
http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/99fb65e2253ca3b34b83 Screen

Vurten

Links

Page title Available Last visit URL Screen

W3Crypto

Description

Links

Page title Available Last visit URL Screen
⬇️
2025-06-16
http://fdevb3qh24ak7wujqsf7co4z6fstm5qxvnkkgs62fayztjfjjtqqgsad.onion/ Screen

Walocker

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
W.A. - Index
⬆️
2025-08-20
http://weepangrbqjfsxd2noz4bmolztnqsma3vw4c6qfnbfusadzd2m26emqd.onion/index.php Screen
404 Not Found
⬇️
2025-08-15
http://am7hswbi46e3ozxec3msxwwzxebkfulsgonhv5kndzeryc2pu46sxmad.onion/ Screen

Warlock

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
Warlock Client Leaked Data Show
⬇️
2025-06-11
http://elqfbcx5nofwtqfookqml7ltx2g6q6tmddys6e25vgu3al2meim6cbqd.onion/ Screen
WarLock Client Data Leak Show
⬆️
2025-08-20
http://zfytizegsze6uiswodhbaalyy5rawaytv2nzyzdkt3susbewviqqh7yd.onion/ Screen
⬆️
2025-08-20
http://ocwjy4ynmpbbzhumh2ama2vl3bc77lf5auqf7nf4k45lbmzoep2rbyid.onion/ Screen

Weaxor

Description

Links

Page title Available Last visit URL Screen
⬇️
2024-12-18
http://weaxorpemwzoxg5cdvvfd77p3qczkxqii37ww4foo2n4jcft3mytbpyd.onion/

Werewolves

Description

parsing : enabled

Links

Page title Available Last visit URL Screen
werewolves.pro
⬆️
2025-08-20
https://werewolves.pro Screen
⬆️
2025-08-20
https://weerwolven.biz/en/ Screen

Weyhro

Description

Appears to be a Data Extortion group with no encryption.

parsing : enabled

Links

Page title Available Last visit URL Screen
⬇️
2025-03-07
http://xtxtpqpyaaek4p4525ksepyyy75gfvi47fptm2gftw7cn656rnfhzdqd.onion/leaks Screen
Weyhro File Storage
⬇️
2025-07-10
http://p7teg7yh2dwxg2tsbgnki3zrt5p7wgaegtfh4cobeqbhcq55nwt2m6yd.onion/ Screen
Weyhro File Storage
⬇️
2025-07-10
http://p7teg7yh2dwxg2tsbgnki3zrt5p7wgaegtfh4cobeqbhcq55nwt2m6yd.onion/files/?share=I1Ny5ax Screen
Weyhro
⬆️
2025-08-20
http://weyhro27ruifvuqkk3hxzcrtxv2lsalntxgkv6q2j3znkhdqudz54rqd.onion/leaks Screen
Weyhro
⬆️
2025-08-20
http://weyhro.hk Screen

Wiki Ransomware

Links

Page title Available Last visit URL Screen

Wikileaksv2

Description

Group is connected to Qilin.

Links

Page title Available Last visit URL Screen
WikiLeaks
⬇️
2024-07-09
https://wikileaksv2.com Screen
WikiLeaks V2 - New Version of the Legendary WikiLeaks Project
⬇️
2025-03-03
https://31.41.244.100/ Screen
wikileaks2.site | 522: Connection timed out
⬆️
2025-08-20
https://wikileaks2.site/ Screen

Wiper Leak

Links

Page title Available Last visit URL Screen
Discord
⬆️
2025-08-20
https://discord.com/invite/jjZQdDNnG Screen

Worldleaks

Description

History and Origins Origins: Formerly known as "Hunters International," active since late 2023, and believed to be a reincarnation of the Hive group. Rebranding: In January 2025, Hunters International ceased file-encrypting attacks and reemerged under the WorldLeaks banner, focusing solely on data theft and extortion. Tactics, Techniques, and Objectives Model: Operates as an "extortion-as-a-service" (EaaS) platform. Affiliates are provided with tools to automatically extract data. Exfiltration & Publication: Theft of sensitive data followed by a threat of publication on a Tor site if the victim refuses to pay No encryption: The group abandons file encryption to focus on theft, reducing complexity and risk

parsing : enabled

Links

Page title Available Last visit URL Screen
World Leaks
⬆️
2025-08-20
https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/ Screen

Xelera

Links

Page title Available Last visit URL Screen

Xinglocker

Description

xing use a custom mountlocker exe

Links

Page title Available Last visit URL Screen
星Team News
⬇️
2022-01-24
http://xingnewj6m4qytljhfwemngm7r7rogrindbq7wrfeepejgxc3bwci7qd.onion/
None
⬇️
Never
http://zckdr5wmbzxphoem77diqb2ome2a54o23jl2msz3kmotjlpdnjhmn6yd.onion
None
⬇️
Never
http://duxht3zdnb2dmq34o5w3tyzpy2kgylidnpaxsn2a7lcxoofb6hqmu7qd.onion/
None
⬇️
Never
http://hceesrsg6f5p4gcph4j6jv6vl4mkmaik735oz4r45lgjfyedsxfoprad.onion/
None
⬇️
Never
http://qfgh2lpslhjb33z3wsenmqrxcdragelinvcpowlgkbjca6yig5zloeyd.onion/
None
⬇️
Never
http://tpze4yo74m6qflef.onion/
None
⬇️
Never
http://ikrah6fb4e6r2raxkyvyoxp22jam5z6ak5ajfnzxutmassoagvr2bhad.onion/
None
⬇️
Never
http://ibih5znjxf2cqgo737xmooyvmxhac45wd4rivh6n5hd7fysn42g3fayd.onion/
None
⬇️
Never
http://z4cn6lpet4y4r6mdlbpklpcrjdruwb6kiuvxn6gsiuoub23z6prlx6ad.onion/
None
⬇️
Never
http://yk7erwdvj4vxcgiq3gmcufkben4bk4ixddl5j2xvu7gurtdq754jmiad.onion/
None
⬇️
Never
http://3klsbd4dwj3yqgo4xpogfgwqkljbnbdxjryeqks2cjion5jj33wvkqyd.onion/
None
⬇️
Never
http://x4mjvffmytkw3hyu.onion/

Xinof

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://wj3b2wtj7u2bzup75tzhnso56bin6bnvsxcbwbfcuvzpc4vcixbywlid.onion

Xollam

Links

Page title Available Last visit URL Screen

Yanluowang

Description

Ransomware.

parsing : enabled

Links

Page title Available Last visit URL Screen
Yanluowang
⬇️
2022-11-01
http://jukswsxbh3jsxuddvidrjdvwuohtsy4kxg2axbppiyclomt2qciyfoad.onion/ Screen

Yashma

Links

Page title Available Last visit URL Screen

Ymir

Links

Page title Available Last visit URL Screen

Zeon

Links

Page title Available Last visit URL Screen
None
⬇️
2021-05-01
http://zeonrefpbompx6rwdqa5hxgtp2cxgfmoymlli3azoanisze33pp3x3yd.onion Screen

Zeoticus

Links

Page title Available Last visit URL Screen

Zeoticus2

Links

Page title Available Last visit URL Screen

Zeppelin

Description

Zeppelin ransomware is a derivative of the Delphi-based Vega malware family and functions as a Ransomware as a Service (RaaS). From 2019 through at least June 2022, actors have used this malware to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries. Zeppelin actors have been known to request ransom payments in Bitcoin, with initial amounts ranging from several thousand dollars to over a million dollars. Zeppelin actors gain access to victim networks via RDP exploitation [T1133], exploiting SonicWall firewall vulnerabilities [T1190], and phishing campaigns [T1566]. Prior to deploying Zeppelin ransomware, actors spend one to two weeks mapping or enumerating the victim network to identify data enclaves, including cloud storage and network backups [TA0007]. Zeppelin actors can deploy Zeppelin ransomware as a .dll or .exe file or contained within a PowerShell loader. https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-223a

Links

Page title Available Last visit URL Screen

Zero Tolerance Gang (Ztg)

parsing : enabled

Links

Page title Available Last visit URL Screen
Zero Tolerance
⬇️
2024-05-20
http://zhuobnfsddn2myfxxdqtpxk367dqnntjf3kq7mrzdgienfxjyllq4rqd.onion/ Screen

Zerolockersec

Links

Page title Available Last visit URL Screen
403 Forbidden
⬇️
2025-08-20
http://ghfuviaplse6nbeowu7ghhid5hdowutbwbrv77aqgwco2b2ntgj3auad.onion Screen

Zeta Leaks

Links

Page title Available Last visit URL Screen
None
⬇️
Never
http://zeta-leaks.onion

Zixer2

Links

Page title Available Last visit URL Screen

Zola

Links

Page title Available Last visit URL Screen