Group profiles
Description
0mega is a ransomware group first observed in May 2022, operating with a double extortion model:
* Encrypting victim files (adding the .0mega extension)
* Threatening to leak stolen data if ransom demands are not met.
Ransom notes are named DECRYPT-FILES.txt and include victim-specific details and a Tor-based negotiation portal.
Unlike typical Ransomware-as-a-Service (RaaS) operations, 0mega appears to work as a closed group, selecting a limited number of high-value targets.
The group employs two main tactics:
* Traditional ransomware encryption of on-premise systems.
* Cloud-based extortion, compromising Microsoft 365 Global Admin accounts, creating unauthorized admin users, and exfiltrating data via SharePoint.
Active period: May 2022 – January 2024
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
0mega | Blog |
⬇️ |
2025-05-29 |
http://omegalock5zxwbhswbisc42o2q2i54vdulyvtqqbudqousisjgc7j7yd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
https://0mega.cc/ |
Screen |
0mega | Blog |
⬇️ |
2024-10-31 |
https://0mega.ws/ |
Screen |
|
⬇️ |
Never |
http://kbavsfyafrpsostfrkg2w2f7ttf55sz3pfqmoza3o2t3mhrdalvdu7yd.onion |
|
Description
2023Lock is a ransomware strain first observed in January 2024, believed to be an evolution of the Venus and Zeoticus families and a direct precursor to the later TrinityLock variant. It employs a hybrid encryption method combining XChaCha20 and curve25519xsalsa20poly1305, appending the “.2023lock” extension to encrypted files. Upon infection, it delivers ransom notes in HTML, TXT, and HTA formats containing decryption instructions. Unlike many modern ransomware groups, there is no evidence that 2023Lock engages in double extortion or data exfiltration, operating purely through file encryption to pressure victims into payment. Its codebase and operational patterns strongly align with TrinityLock, which emerged a few months later with more sophisticated extortion tactics.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
3AM, also known as ThreeAM, is a relatively new ransomware family that emerged in late 2023, initially deployed as a fallback option when LockBit infections failed. Written in Rust for 64-bit systems, it appends the “.threeamtime” extension to encrypted files and tags them with the marker “0x666,” while deleting Volume Shadow Copies to hinder recovery. 3AM operators use a double extortion strategy, combining file encryption with data theft and threats to leak stolen information. More recent campaigns have shown increased sophistication, incorporating email bombing followed by vishing calls to convince victims to grant remote access via Microsoft Quick Assist. Attackers then deploy virtual machines containing backdoors, allowing them to remain undetected while exfiltrating data before attempting to launch the ransomware payload.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Verify |
⬆️ |
2025-08-20 |
http://threeamkelxicjsaf2czjyz2lc4q3ngqkxhhlexyfcp2o6raw4rphyad.onion |
Screen |
403 Forbidden |
⬇️ |
2025-01-09 |
http://ulkvlj5sirgrbnvb4hvbjo2ex2c2ceqe2j4my57fcdozpbq5h5pyu7id.onion |
Screen |
Enter the key |
⬆️ |
2025-08-20 |
http://threeam7fj33rv5twe5ll7gcrp3kkyyt6ez5stssixnuwh4v3csxdwqd.onion/ |
Screen |
Description
8Base emerged in early 2022 and rapidly escalated its ransomware operations by mid-2023, positioning itself as a “simple pen tester” while executing a relentless double-extortion scheme: encrypting files using AES-256 CBC mode (appending the “.8base” extension) and threatening to leak stolen data via a Tor-accessible leak site. The group leverages initial access methods such as phishing and SmokeLoader, disables security mechanisms like Volume Shadow Copy and firewalls, and deploys persistence via registry and startup entries. Targeting primarily small and medium-sized organizations across sectors such as manufacturing, finance, IT, and healthcare in regions including the U.S., Brazil, and Europe, 8Base has drawn comparisons to Phobos and RansomHouse for its tactics and ransom-note style. In early 2025, international law enforcement operations disrupted the group, resulting in the arrest of four key actors, seizure of servers, and warnings to hundreds of potential victims.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Home |
⬇️ |
2023-10-30 |
http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/ |
Screen |
This site has been seized |
⬇️ |
2025-08-20 |
http://xb6q2aggycmlcrjtbjendcnnwpmmwbosqaugxsqb4nx6cmod3emy7sad.onion |
Screen |
Home |
⬇️ |
2024-11-30 |
http://92.118.36.204/ |
Screen |
This site has been seized |
⬆️ |
2025-08-20 |
http://xfycpauc22t5jsmfjcaz2oydrrrfy75zuk6chr32664bsscq4fgyaaqd.onion/ |
Screen |
|
⬇️ |
Never |
http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/contact |
|
Description
The locker is written in C/C++/ASM.
It supports all systems starting from Windows 2003, has a separate binary for ESXi, and uses a unified encrypted file format across all systems.
WINDOWS:
• Two encryption modes: patch-based and file header.
• Extensive configuration settings: from ignoring specific paths/extensions to terminating services/processes, unlocking occupied files, working with network shares, and more.
• Arguments available for shutting down Hyper-V virtual machines, deleting backups, network scanning with logged-in user tokens.
• Each build includes an obfuscated PowerShell script.
• Execution is password-protected.
• The locker itself is shellcode for x86/x64; if you have custom execution methods, we can provide the shellcode.
ESXI:
• Encrypts files in patches, with configurable path exclusions.
The default configuration is pre-set to avoid disrupting Windows/ESXi/Linux systems.
Our commission is 20% of payouts
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Abrahams_Ax, first observed in November 2022, is not a Ransomware-as-a-Service (RaaS) operation but a politically motivated hacktivist persona. The group is linked to the Iranian-associated threat actor COBALT SAPLING, which previously operated as Moses Staff. It uses double-extortion tactics focused on stealing and leaking sensitive data rather than encrypting files. Infrastructure, visual branding, and operational patterns strongly resemble those of Moses Staff, suggesting a shared origin. Its most notable incident was the breach of the Saudi Arabian Ministry of Interior, where stolen data was published alongside propaganda content. The group’s targeting appears to align with Middle Eastern geopolitical interests, particularly against Israeli- and Saudi-linked entities. No encryption methods or file extensions are publicly documented, as encryption is not part of their operations.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Database Error |
⬇️ |
2024-02-09 |
http://abrahamm32umasogaqojib3ey2w2nwoafffrguq43tsyke4s3fz3w4yd.onion/ |
Screen |
Description
Abyss‑Data, also known as Abyss Locker, is a ransomware operation first identified around March 2023. It conducts double extortion by exfiltrating data and encrypting systems—particularly targeting VMware ESXi virtual environments—then threatening to leak stolen data via a TOR-based leak site if ransom demands aren't met. The group’s Linux variant derives from the Babuk ransomware source code with encryption resembling HelloKitty, using ChaCha–based ciphers. On Windows, Abyss Locker encrypts files (typically appending “.abyss” or randomized extensions), deletes Volume Shadow Copies, manipulates boot policy to disable recovery, and delivers ransom notes (e.g., WhatHappened.txt), often replacing the desktop wallpaper as part of its extortion tactics. Its campaigns have targeted diverse industries—finance, healthcare, manufacturing, technology—across multiple regions, with victim lists prominently featuring organizations in North America.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Abyss-data |
⬆️ |
2025-08-20 |
http://3ev4metjirohtdpshsqlkrqcmxq6zu3d7obrdhglpy5jpbr7whmlfgqd.onion |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://ufvi7hpcawesdklmommeeq4iokhq2km4hay3dwh4rirth5xaomle35id.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://t7ogwvu74a6flssns55yv7zw2xvssqbhrdbxqrwbahumyzwklnvqayid.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://gmxnejtsg3uiwopmnsooxbi3p2nukwemkvm7bg44tgbbnuuuyofqjfyd.onion/ |
Screen |
|
⬇️ |
2024-10-17 |
http://jtjz6utbmabwcatyomwxaeum7ey7nxs7yooqflxhctnksjqsnammonqd.onion/ |
Screen |
|
⬇️ |
2024-10-17 |
http://2mhkqjcw4auxop7auchz2iijcbj63qccwodtokofbb2ul5oejkkt6xyd.onion/ |
Screen |
|
⬇️ |
2024-10-17 |
http://wka7ma7rzgmzmtn65dhv5zp5p6e3uv5sydnns7xsf6kpf7noukhchhqd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://l3yeoyhnphtymqua5env7qitedmqv5ahe7waxgndwa64z2c2h3cjjhqd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://2j45tydxcvm44jbyr6krhx77rzey3jtif5qdjak2gik4usoljvvhqaid.onion/ |
Screen |
|
⬇️ |
2024-10-17 |
http://cuft7z2xlfogrtx4ddqnjqyerye2qtagksow2fip4xbb5iw7dsgtvhqd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://wyz32kscr2ythqpyjwqfxcaxn5576fdurr7jag44gggnmi4cvhykhvid.onion/ |
Screen |
|
⬇️ |
2024-10-17 |
http://3pb6cefz6hubgyb2ph7ua7yjzjpxwapbbp5zomz7xmvrjhjfykjwu6id.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://kn4spxunete4ddz7375i2wpnj4vvkir7wdmcg2pc5yod56lmb54nbayd.onion/ |
Screen |
|
⬇️ |
2024-10-17 |
http://2ikvareyuw2wjnc4vb5yteq7d2tkg6k3gevnixzqtkn3cpvej6ajj4yd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://wflff64dxxqvfhd7poarkvkphmibdjyyhv7h4zqo5m52ggsgncmbrbqd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://frheu6drsqpehmuyrdxdrfu5bzqwxps4zlmnuxlcnxskwxcwqsyhwxyd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://kceqbaoxmx2czutxty3mq35m5mv46dq66hpszrhbhduj7uwhu6ax3qad.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://4nsmlpz4qceow7bfrmarxdqaj7chcqobin3mzb27uhscb2yvjs6j4xqd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://nka6xgyyu77ksb5xmmovp4en2hrkg53mfq2osql526oe7nybnlggfgid.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://mflnjnwfinorxxsgkyfel3fqanbtbbrl5k5mqqjwmrf7o3jc6a4hy3id.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://jtt4lqatjtrj5hxxi33dczkluouf5wivzdmy4v62dnhipk6ixk5mktad.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://udugclljnfcx34amtpddkjggmkfqci5xnlfef2hqtxstufulo3pvauid.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://vmmefm7ktazj2bwtmy46o3wxhk42tctasyyqv6ymuzlivszteyhkkyad.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://cfev2mvlqooohl3af2upkgu3ju4qcgqrrgh6sprfxkgh3qldh2ykxzyd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://2fzahjlleflpcyecd245xe3q6tczjkwzcm4fbhd4q4bsun45y2csyayd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://wpefgvpyuszr4vg444qed734big233itylqclte7usszbdbfyqvb2lqd.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://gvzbeu532wwxqze3v3xcxpsbhpvwusnajzahi55dqklbunzgjp5wchad.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://ieelfdk3qr6as2u5cx3kfo57pdu6s77lis3lafg5lx5ljqf2izial6ad.onion/ |
Screen |
|
⬇️ |
2025-02-19 |
http://yuhflx7yjk52jedcrtb3ne235mmykqfwc6jarby7lxxgv26ep7x4qjqd.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://zngbsq66uwem4qzyxpqb5rjo2xebnbwdku27nhmquryx6ljnbbedhiad.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://ub63kcmphxbm3m64wwhuznbxfap4hlgqtauhnf4rvz23cdnrqr4towid.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://s5v5hvtk3oyxg3m6afgxeuwlasqku3adeosv7kwwjfvhf22vqiwotrqd.onion/ |
Screen |
|
⬇️ |
Never |
http://jqlcrn2fsfvxlngdq53rqyrwtwfrulup74xyle54bsvo3l2kgpeeijid.onion/ |
|
|
⬇️ |
2025-02-19 |
http://bgifgvekggqjfqx6x45e24vq7nm6in54rk36fo6jg4qf3yvy6lfisgid.onion/ |
Screen |
Hello |
⬇️ |
2025-08-20 |
http://yehbrr7tnzrcpcq2fglrf73ug2jqhgngxnyv3clyhrswdwmg45p7fyad.onion |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://46vfmzfh3uxc3ojn6z267jmiytfhxzq4x7vvnqtycu5wa6hh3jl2hjyd.onion/ |
Screen |
Hello |
⬇️ |
2025-08-20 |
http://tycacxbqdhohowofueufbnekscyomymoxbr4wlim5cqpfv72z6popcid.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://y7fupmz3lx64ilnyvxbu73xigzdtc6fl2aee2duuf546duoo4nurv2id.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://7lpodmzejui2scqfojx3voadc7fgrt2igww6ipjtnztfg6hprnmel5yd.onion/ |
Screen |
Hello |
⬇️ |
2025-08-20 |
http://toczr6bmtfbgardwgcgbeqntumkxi3y2tsfbcstybf6xknd6cm6e32ad.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://euujzkwziy777bg4oyiks2x3s5cxlydao6jhpilzdjmjohja3s4v7jid.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://vnsggttwhcofyeh3nxoynxtg5mk5xl4cd7e3c4x62aqb2rj4rfjh3eqd.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://ah73jnvhuoznb4n3srbtspsgrdyyde2xszywcjryjroz4wixhwmdrjad.onion/ |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://l7f3ny5yedcm7zhgxzy34mihk6jvgwg7m6qj3cqw4nvky7xv5wttegyd.onion/ |
Screen |
Description
AdminLocker was first observed around December 2021 and appears to be a lone operator or small group, with no clear Ransomware-as-a-Service (RaaS) model reported. It uses single-extortion tactics—encrypting files without publicly documented data exfiltration—primarily targeting enterprise and personal systems via methods such as malicious email attachments, cracked software installers, P2P downloads, and malvertising. The ransomware employs symmetric and asymmetric encryption (likely AES combined with RSA) to lock files, appending extensions such as .admin1, .admin2, .admin3, .1admin, .2admin, and .3admin; victims receive a “!!!Recovery File.txt” ransom note with instructions to pay via Tor and Bitcoin. Notable for its multiple simultaneous variants with varied extensions, it reportedly allows victims to decrypt up to five small files as “proof” before demanding ransom. No high-profile sector- or region-specific campaigns are publicly documented.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://adminavf4cikzbv6mbbp7ujpwhygnn2t3egiz2pswldj32krrml42wyd.onion |
|
Description
This ransomware group (notably stylized as aGl0bGVyCg) has extremely limited publicly available information. No confirmed active period is documented, nor is there evidence of whether it operates as a RaaS (Ransomware-as-a-Service). Similarly, there is no known data about its extortion type (single or double), preferred targets, intrusion methods, encryption techniques, file extensions, or ransom note behavior. The only identifiable detail is the blog URL hitleransomware.cf, which appears to serve as its public-facing leak or command-and-control site. Overall, public threat intelligence remains too sparse to draw even basic conclusions beyond the existence of the blog site.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Error Response Page |
⬇️ |
2025-02-23 |
http://hitleransomware.cf |
Screen |
Description
AiLock is a Ransomware-as-a-Service (RaaS) group first identified in March 2025. It employs a double-extortion approach—encrypting files and threatening to report breaches to regulators or share stolen data with competitors if the ransom isn’t paid. Victims have just 72 hours to respond and up to five days to pay; failure to pay results in data leaks and destruction of recovery tools. The ransomware appends the extension .AiLock to encrypted files, changes file icons to a green padlock with the “AiLock” name, and replaces the desktop wallpaper with a distinctive robot-skull logo. It employs a hybrid encryption scheme, combining ChaCha20 for file encryption with NTRUEncrypt for securing metadata, and uses a multi-threaded design (path-traversal and encryption threads with IOCP) for efficiency. While active campaigns and leak sites are confirmed, specific sectors, regions, and intrusion methods remain undisclosed in public sources.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Support chat |
⬇️ |
2025-03-14 |
http://jaawqs6wu56n2adj7qrjg25dhcux2nislvjouffpzldj23e4y72akoid.onion |
Screen |
Hello |
⬆️ |
2025-08-20 |
http://vnsggttwhcofyeh3nxoynxtg5mk5xl4cd7e3c4x62aqb2rj4rfjh3eqd.onion |
Screen |
Description
Akira is a ransomware group first observed in March 2023, targeting both Windows and Linux environments, with a particular focus on corporate networks and VMware ESXi servers. The group employs a double extortion model, stealing sensitive data before encrypting systems and threatening to leak it on a Tor-based leak site if ransom demands are not met. Akira typically gains initial access through exploitation of unpatched VPN services, compromised RDP credentials, phishing, or abuse of legitimate remote administration tools. Its Windows variant uses the Windows CryptoAPI to encrypt files, appending the “.akira” extension while skipping critical system folders to maintain system stability. Ransom demands have ranged from $200,000 to over $4 million, typically requested in Bitcoin, and the group has been linked to high-profile incidents affecting education, manufacturing, and healthcare sectors. Akira appears to operate independently rather than as a Ransomware-as-a-Service, and continues to evolve, with recent variants improving encryption speed and evasion techniques.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬆️ |
2025-08-20 |
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/ |
Screen |
/ |
⬆️ |
2025-08-20 |
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/l |
Screen |
Description
First observed in early January 2020 (initial victim post on January 9, 2020), Ako (also known as MedusaReborn) operates under a Ransomware-as-a-Service (RaaS) model, with daily beta builds reportedly offered for affiliates. It uses a double-extortion approach—encrypting files and exfiltrating data, with subsequent threats to leak the data via a dedicated leak site. Delivery primarily occurs via malspam, often through password-protected ZIP attachments containing malicious .scr executables. After compromise, it deletes shadow copies and disables recovery, then encrypts files—excluding certain extensions—and appends random six-character suffixes, dropping files like ako-readme.txt and id.key. Encryption is carried out using unspecified algorithms, but its behavior aligns closely with MedusaLocker variants. Known targets include networked Windows environments, potentially across multiple sectors. No notably high-profile or geographically specific incidents are detailed.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion |
|
|
⬇️ |
Never |
http://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion/ |
|
Description
ALPHV, also known as BlackCat or Noberus, is a ransomware family that is deployed as part of Ransomware as a Service (RaaS) operations. ALPHV is written in the Rust programming language and supports execution on Windows, Linux-based operating systems (Debian, Ubuntu, ReadyNAS, Synology), and VMWare ESXi. ALPHV is marketed as ALPHV on cybercrime forums, but is commonly called BlackCat by security researchers due to an icon of a black cat appearing on its leak site. ALPHV has been observed being deployed in ransomware attacks since November 18, 2021.
ALPHV can be configured to encrypt files using either the AES or ChaCha20 algorithms. In order to maximize the amount of ransomed data, ALPHV can delete volume shadow copies, stop processes and services, and stop virtual machines on ESXi servers. ALPHV can self-propagate by using PsExec to remote execute itself on other hosts on the local network.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
THIS WEBSITE HAS BEEN SEIZED |
⬇️ |
2024-06-25 |
http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion |
Screen |
Start-maximized.com |
⬇️ |
2022-04-09 |
http://2cuqgeerjdba2rhdiviezodpu3lc4qz2sjf4qin6f7std2evleqlzjid.onion |
|
404 Not Found |
⬇️ |
2024-06-25 |
http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/api/blog/all/0/6 |
Screen |
THIS WEBSITE HAS BEEN SEIZED |
⬇️ |
2024-06-25 |
http://vqifktlreqpudvulhbzmc5gocbeawl67uvs2pttswemdorbnhaddohyd.onion/ |
Screen |
THIS WEBSITE HAS BEEN SEIZED |
⬇️ |
2024-03-09 |
http://alphvuzxyxv6ylumd2ngp46xzq3pw6zflomrghvxeuks6kklberrbmyd.onion |
Screen |
|
⬇️ |
Never |
http://d75itpgjjfe2ys2qivqplbvmw3yyx7o5e4ppt2esit2lluhngulz4hqd.onion/ |
|
|
⬇️ |
Never |
http://sty5r4hhb5oihbq2mwevrofdiqbgesi66rvxr5sr573xgvtuvr4cs5yd.onion/ |
|
|
⬇️ |
Never |
http://xnsbsjciylsg23zfmrv6ocuyh7ha5zexeouchlr3zsi5suda4arpeyqd.onion/ |
|
|
⬇️ |
Never |
http://24y6h7fwi2fvlv2kuzudyiumjqz4rgqcml2wr7te6ugcgt6qatqe64yd.onion |
|
|
⬇️ |
Never |
http://2plv344u23ebuayurqcfbjbnxpqzqknja3ca7ulbnnwtgb6tpmqqsvid.onion |
|
|
⬇️ |
Never |
http://2udgodqyt6jn7s7cb7n66kaisg7i6gxo5n64tnvlk7dee4d4rguojbid.onion |
|
|
⬇️ |
Never |
http://3bkgnqvrdlzib4t62oyo22eqljdrjaxtwcsvgwystog6yiyx7j7b7nad.onion |
|
|
⬇️ |
Never |
http://3fgntkytua2jb7rarvuchns6ka7tfh3uc6ypub3ffepjq3jekb3eypyd.onion |
|
|
⬇️ |
Never |
http://3g7cqn66j3uwes7jah744u6fzuzymvnlubn67624jwvswoollqkjtzqd.onion |
|
|
⬇️ |
Never |
http://3id2g6u3dwvg7nsarfkgsdf3odp5hb7owvnoqbipbisekudptetuxtad.onion |
|
|
⬇️ |
Never |
http://3kqfll43jsj7boglorh5xntudnynlk6howi6ks543cctlrnid4dzwdad.onion |
|
|
⬇️ |
Never |
http://3md3it5uxkebudflmlratms66jvwkrdphzoo4nzsvwh63niqpz42aeyd.onion |
|
|
⬇️ |
Never |
http://3oz6naflgy7gbtc4psqumk4dd7meq37tjxw7qxhytuiysyq3632xgsqd.onion |
|
|
⬇️ |
Never |
http://3s5pzwlqllrzz4xlluholmqgueje7lutlugbdnwa3ehbedrxaq5wjbad.onion |
|
|
⬇️ |
Never |
http://3xa42kwkeiwzhjybddfeifad7vn2kvsslybquledvib5xsfkylwtwyid.onion |
|
|
⬇️ |
Never |
http://425yxsnocj47lwgueymn7y4y4vrphccooa3diabzoqdl6cslxriqxrqd.onion |
|
|
⬇️ |
Never |
http://4kfzqzfci7uqpgngrosuukgj2dr745cyqgenbaojycdykgxipabnyqyd.onion |
|
|
⬇️ |
Never |
http://4mncnm5bl3jfotcgrn7zv2uznfzs2oo4sahwrlqvwcd265x6jdudkcid.onion |
|
|
⬇️ |
Never |
http://4qmsi7vcdrrutxapxbc7eofjjzfsvam3fehgmk6xyivwcroqkqjij5qd.onion |
|
|
⬇️ |
Never |
http://5e2q3uzczl3bur23dxfxxu5unlukuqrlseesmxc7v7dmo4qgbr3kaxqd.onion |
|
Oshi - Anonymous file storage |
⬇️ |
2025-05-23 |
http://5ety7tpkim5me6eszuwcje7bmy25pbtrjtue7zkqqgziljwqy3rrikqd.onion |
Screen |
|
⬇️ |
Never |
http://5hhrba7et452bt3ttwqewumlua5t3vyyr27iomrv2o3ae6of3l7hghad.onion |
|
|
⬇️ |
Never |
http://5igait2ocdf7kfktyemdgdl6cot43ryecr5ycqid6drydhpuzibu54qd.onion |
|
|
⬇️ |
Never |
http://5rosrz5d53usc6p7s7qjvvcqv4bbedvpjsv3dzls7kuend2i65s7peqd.onion |
|
|
⬇️ |
Never |
http://6lbwfgybggslvhkbsfqo427sqnfhutb65wmhvj5qlko32farj6w45qid.onion |
|
|
⬇️ |
Never |
http://73tzbwujmnmz35k74eclnhlkwmnjrlmfeut3udxwnfsc53kg2kvdpead.onion |
|
|
⬇️ |
Never |
http://752ezjq6t4pwdtrwviimap3wlzqm2qzd6hh2rwffzq3d2urw3o7xa6qd.onion |
|
|
⬇️ |
Never |
http://7pwwm7j5w5gjgs7nibha6dqknqliiwqvimkkja7zdgmozx2ikjtfigad.onion |
|
|
⬇️ |
Never |
http://a5ciw2q5jijci5wj63s47zpul7bq3n36ng2qncta24yc6bsmkhoeg2ad.onion |
|
|
⬇️ |
Never |
http://acvhxy4cc52a7iv7ugc4eq6dq6nus2s5xduew7s2wkaw6nhftasyq2yd.onion |
|
|
⬇️ |
Never |
http://afl6q5mjgzgm765wfneiojktyppxbhkclhghfgcfpvr2nmadczqs4sqd.onion |
|
|
⬇️ |
Never |
http://ajdtbop62plz3s2uw3rjtegilw4lfmixl7h4p6oset5rq5jihwtehtad.onion |
|
|
⬇️ |
Never |
http://amo6c37dbe2bkgpopymaqms4vusn7kafqxy7pgqk2etengd76xk5w3ad.onion |
|
|
⬇️ |
Never |
http://arzaonkha4jubxjgg47dkjjz42ol72wmwvjmtz47a33box2gupk2v4ad.onion |
|
|
⬇️ |
Never |
http://bjiztkvfzboiiggfnf3pctsyllq6fy6rmllxbq4rk7uyd3w4eh2snpad.onion |
|
Index of / |
⬇️ |
2024-12-15 |
http://bmebpteoa53k76zoiafykh4axr4kzbx7jn2djvdrdde4r57bckkfxsyd.onion |
Screen |
|
⬇️ |
Never |
http://boq6yg6a523cqjbsu7nwjscakdpnjlyytapnodmmimh63kq7r3l3hmyd.onion |
|
|
⬇️ |
Never |
http://bq67odzyhxshp3vcvdvau4xosn54rmudy3dzqlmm2hkd3m4b2qackcad.onion |
|
Index of / |
⬇️ |
2024-12-15 |
http://bvn5r7dzfdn2k2wcv7ifwtvi37zsm5kxv776nqw5lh7hwr4gd7msyhyd.onion |
Screen |
|
⬇️ |
Never |
http://c5ic3pm46hytw4r47z6t6yxsffndo52lcitf5sgauwyrqmsjfb4etdqd.onion |
|
|
⬇️ |
Never |
http://cffb3fd2sofyiemffnzy7jjbuq7la3nftexl26574q3xkw5ycqf2r3id.onion |
|
|
⬇️ |
Never |
http://cfj4bsnfi4ktpfoei7uqggz5sb443fhvvbkxbmu3dhfriomg2txxgxid.onion |
|
|
⬇️ |
Never |
http://chygou6fs4nu2r56ncfd3crjb62s6sysulg7y7ds2tbdoa4d3wcwrdyd.onion |
|
|
⬇️ |
Never |
http://civmwfeogouzf27jldj2buu3ihmpooupjhfbdgdth6maptrntim6oiid.onion |
|
|
⬇️ |
Never |
http://d2abffaqhce6cbnlrdcsb3iafxhr5iqmezpfoxkpx3zf5j7tngqdskid.onion |
|
|
⬇️ |
Never |
http://dcoezwwwxij2trzd3oqhtyjg3lgvgzmyzrj2pcs3rdfh4tl5267dwpyd.onion |
|
|
⬇️ |
Never |
http://dgxxqqhvob4cvriyy2rdiwgyvuqewwsq4tbq7rnk5ulqh6zvroutvpyd.onion |
|
|
⬇️ |
Never |
http://doh3rlqtvg24yu4r4w7bk5twm7w6nm7wqsr3d3roc7jisrdqf5catnad.onion |
|
|
⬇️ |
Never |
http://dr2tr76ftudjccp4zc7fks5lhk3pg3rifl3rcc36bgm46sfivkq2sfqd.onion |
|
|
⬇️ |
Never |
http://dx2g4nm4ouhpqd6c6ttkzbnsliw3empzrwej3ilbwo6zz4g5rcgeazid.onion |
|
|
⬇️ |
Never |
http://e2ejecjvrpik5bjbvdczu7bjww4epxzsyz3nl7f52oe5pi43ddcsixid.onion |
|
|
⬇️ |
Never |
http://elcurwunjxjhx24aud6p47htzrrkxvbispdacsatsumlunagoylbgwad.onion |
|
|
⬇️ |
Never |
http://eyeeabnztw7jphcloghjraqihvon5pgo3gegsgypkg3cxn6jhg4wq5yd.onion |
|
|
⬇️ |
Never |
http://fafuye3k6sfv4t4nkr2vje5s523q6hfego5cwlze6gdntvxgnjebqnid.onion |
|
|
⬇️ |
Never |
http://fbehz3443h644jrcu3djvexhplhmnijilkq54puzrxuvloc42oykgiad.onion |
|
|
⬇️ |
Never |
http://g5a2thsvpabyjp6prphsque7nyaauul4rryr2nulytakggkecls23bad.onion |
|
|
⬇️ |
Never |
http://ga6pe777wjfk6xuhkepqtfldiqjx253an7dofzmyrlwzgqipqgtwwtyd.onion |
|
|
⬇️ |
Never |
http://gevvr5kripac4p52ixiq3ufnkr4qasn64r5d7fsyu3kk2zmuyarbvdad.onion |
|
|
⬇️ |
Never |
http://gjv7s67txrkdxftyfyt2xpcqkp76bmy7eqlumhmile6z6z2y23jkpkad.onion |
|
|
⬇️ |
Never |
http://hdyacvmmr4x2ms5tg4w5vnqzxfnlat4iosbmf7qz5xxoumnqfrcv2wqd.onion |
|
Welcome | SecureDrop | Protecting Journalists and Sources |
⬆️ |
2025-08-20 |
http://he5dybnt7sr6cm32xt77pazmtm65flqy6irivtflruqfc5ep7eiodiad.onion |
Screen |
|
⬇️ |
Never |
http://hut4icumte4mphbzuk7cycppiubjdzfpilgsdku6vydrn7kg7y5f6oad.onion |
|
|
⬇️ |
Never |
http://i3jwvuhloergmbeimztm6btpjzshvvcaqj2qrweeehcjhf37tndxtoqd.onion |
|
|
⬇️ |
Never |
http://ieflygyfoezms2wshjpfyfz4hpyxjcdtxejntysvopd7n7cmmnucbkad.onion |
|
|
⬇️ |
Never |
http://ijmyrvd3ntbdu22auxpgiiblzxplfw6xqpdztoosfrbqiznymayxfsyd.onion |
|
|
⬇️ |
Never |
http://irn7otydieltebh3ex2rdfpspdxbcyrgp6kqczjtg4xd7ay7dfmbf7id.onion |
|
|
⬇️ |
Never |
http://iromfhuademn34fsfdvdrobxdj3tz7mfp2rdj4o2nmfp55fr6xgm3hyd.onion |
|
|
⬇️ |
Never |
http://j7gpjp46swlikocg3v7tlxc2zdrdlg5gft62bnqiqjgv4lzvaeg6h5id.onion |
|
|
⬇️ |
Never |
http://jrq44df5h2xysjsajuidspv7zxl7g7v7viujicudptufaozi2i65cnad.onion |
|
|
⬇️ |
Never |
http://khmpzqnzpya5o27lyp2vt2vw5cy7rb2mfflrhmikubhetncf2nh7ahad.onion |
|
|
⬇️ |
Never |
http://knt3cs4tkxqdnrjrzk3n7txyhb6c5szkgjwy74jomyvy5xuli5qcdsid.onion |
|
|
⬇️ |
Never |
http://kv7nxc6sg625vl4rd4fsy4asero3jqivp7zyhaohsyww2xnk7r7yenyd.onion |
|
|
⬇️ |
Never |
http://kx77iuzg25qlesz3zm7nvy4i6vxecc5jtksf5gllknescfktvzhyo2yd.onion |
|
|
⬇️ |
Never |
http://kxmbveamxzfrnxacprpbldcy3p263kvrjiblaw4p55mzrkaf3si6w4id.onion |
|
|
⬇️ |
Never |
http://l2gsnjel3ongbhzvuftuhkbkx5uoso7fvsfqq6oxt25ph4anxxwnl2qd.onion |
|
|
⬇️ |
Never |
http://ldl45mghc3vscfucdntjc2cax7z3k5fxxxfthvrxhilr4sk2a2dveqid.onion |
|
|
⬇️ |
Never |
http://lkwkv2pzl3rpo63pqagijqsdo5t52lqwvuu5n34ito4jjnkyfc66smyd.onion |
|
|
⬇️ |
Never |
http://m6hx7svbvoxhkylaey2jfqxxcychksmx7n455aavt4nan6cuztzkiiyd.onion |
|
|
⬇️ |
Never |
http://m75bpllrckr7gus26rd6clvvcq6my6tb2bmw6crsevft4t4sv4fsbeyd.onion |
|
|
⬇️ |
Never |
http://mdixxkgamwij6sy7stxy4fiqwbmfmci2fbjbbndaq2txgaz25zz23xqd.onion |
|
|
⬇️ |
Never |
http://o522tg3wwqzypsc5yosrhr7mji5as45p2srrzvwd762h5sparfw3j2id.onion |
|
|
⬇️ |
Never |
http://oylk6phjrgcjvhv5rjijwrpcqj4ig3f2evbxb6lzofw7cbgxlpetq7ad.onion |
|
|
⬇️ |
Never |
http://p4tn5c42tfkr257a5djzs7iadvuunb7ydowuc6s2ghifbv5buc5pvsad.onion |
|
|
⬇️ |
Never |
http://p5f7j74vjhcifcxjmg7dswszfsk5z73ftohjj4nlnq7k3qcy4vtxraid.onion |
|
|
⬇️ |
Never |
http://pmpkjv36ca5ykwmjnfnr5cadctt4ldcekaxocbwa57btujhi7mly6kid.onion |
|
|
⬇️ |
Never |
http://puqwe2eijzpw33p65qq4ql37dtza64ug3hpsflgxvok7kipzinzry2qd.onion |
|
|
⬇️ |
Never |
http://q72tfgqh6wi237u2nqxuyuiawkyac5p6qav7mo2r67mu3ufl5gbou2ad.onion |
|
|
⬇️ |
Never |
http://qfhgvlly3qmrp4sbpr54bc6ci2riwuac6aw72enw2xmcb5yo57jzmkad.onion |
|
|
⬇️ |
Never |
http://qpcdrem3wd7ihi3x2tfgy7tvh2ldck4nezaxotxqc4vrc2ek3hkmejid.onion |
|
|
⬇️ |
Never |
http://qrrfiv7l5gsrc7q2n6mfxrbaq33vsvum7d6plx4maslkfxk5pmxt6ayd.onion |
|
|
⬇️ |
Never |
http://r4aub3bfqf4jh2e6whomjt6bs6abzvtlhwuu2us4fhglnhic3rjegoyd.onion |
|
|
⬇️ |
Never |
http://rq4ahdxs5yjm5s66d7dkgwpwduzj6e5yckhdt2mqmc3utp47ap3fjcyd.onion |
|
|
⬇️ |
Never |
http://rwkwobi6dz6dxzhnjpnau77ejcq3ar4ajjal42pj7usotilyj3bbfpyd.onion |
|
|
⬇️ |
Never |
http://rzs7rnmp37k6g3wbmym7oi23h2cc6wcf65oxsetun6cp25sna6256xad.onion |
|
|
⬇️ |
Never |
http://s5hcgpxzeehnkwlpb3xkelvkv6rpi5rszmhfeywncja26bxdzexp6zqd.onion |
|
|
⬇️ |
Never |
http://s7isfnfsrrnogkkvzzmqpqlcehajalaht5nmel7nbxwhvqc52jj2ejid.onion |
|
|
⬇️ |
Never |
http://sktwn6mi53hbyylkzswtquemuuirsn5qivdz4evhgbobqqzcfbw6pyid.onion |
|
|
⬇️ |
Never |
http://smo3gebcr5mkff7ja5ayi2xdz2xsapdixak4eosj5ah6fgrbluoxrkqd.onion |
|
|
⬇️ |
Never |
http://t3zm26nipjrttk5bzbr37crc32kufsixoonf7tmyqviduogoul54vbad.onion |
|
|
⬇️ |
Never |
http://td4ngpvlle7udkh5svgilgph5v3f63uo3hv3coh7gpdsqozo6it46sad.onion |
|
|
⬇️ |
Never |
http://tfeo2er3vmcal5tltu7vpnegh2cmmjsdyldfhisdco75mysi4ta6dsqd.onion |
|
|
⬇️ |
Never |
http://toeaxffzwscqgb7ftetfvldqf2xkqfx4g5kpqejney2ysyirtqdwcvyd.onion |
|
|
⬇️ |
Never |
http://tuw6in37vku6kg3mvnwaxsldhruujpihibpxbq5ne42phqgv4ekuirqd.onion |
|
|
⬇️ |
Never |
http://u27qc3ar5s2pqaod5ugxwyymaay6zii5lqfeo4nrs6ykysgzznk3kmad.onion |
|
|
⬇️ |
Never |
http://u3cko3mc66cfvnf5luzkw5n36q34eges5raq2i3viuiewfvnkqoxztid.onion |
|
|
⬇️ |
Never |
http://uab4byztmlcfsqb6v7pjoe3pnrvx2uckcuegvjyqui4wzy77jppzd3id.onion |
|
|
⬇️ |
Never |
http://ucrh53a22g5l3swwtfvvrjjtawrubpedn4s7lws4krbyy7itpvymybad.onion |
|
|
⬇️ |
Never |
http://uvovouktcgmq55h5i7axt4qrms6iq6znn5cfcrmg7qjseray4dcjxxqd.onion |
|
|
⬇️ |
Never |
http://vgkclj5nqv53iy455dlfthg75a5cg6ndkazvizrnxrx7fshdqzw4m2yd.onion |
|
|
⬇️ |
Never |
http://vldmvht6s253et33ce6gcth2vikuvsi7xgkzim5frqiowq6an6tmlaad.onion |
|
|
⬇️ |
Never |
http://vzxulehmjar6jmkjiy6qpj5mbgma3nl7o2mncrimjwjl5j3lk5ea35ad.onion |
|
|
⬇️ |
Never |
http://wiuco7yxvd6ygklc5kngraftysq7sgtkpcqtstpthj3ihxdarjlojcad.onion |
|
|
⬇️ |
Never |
http://xqclaoqanufx6z77e3ieun4xvmrsenolxjhhvlk56yfncuke66myfsqd.onion |
|
|
⬇️ |
Never |
http://xvks2js3rexd7kyzitdpnwzzqt3s5xxqj2dkydep6r563u7bgfgbdead.onion |
|
|
⬇️ |
Never |
http://y7u6xpydaobdwz7puojmze3estmhyx4qpbpihm2qfsfdgoenns6gtcid.onion |
|
|
⬇️ |
Never |
http://yh4vjsv3u27zlzosrsjc5aveua3iclhifjmwdr5uujsaqz7hfkkljfid.onion |
|
|
⬇️ |
Never |
http://ymfmzthvho5q7jituowluckkq45dogsf3ru25ev4nlehaq65hy4w6pid.onion |
|
|
⬇️ |
Never |
http://yo3f4ytjbuf3j4bx3m6s523e5hue7afxaprlikjuxf57ed7pc5dnpaid.onion |
|
|
⬇️ |
Never |
http://zae5d3try3lmnpb6mcx2mbqgp5xawuixm4ktofscv63btekwvcpg6ryd.onion |
|
|
⬇️ |
Never |
http://zawzev3zlywn7dy642nokfgmkmupgsrfhhquhhqkgcwml2pk7io6fjyd.onion |
|
|
⬇️ |
Never |
http://zcll3muuhw3uqtgxzdojqv52fuifg5z2knk5w63mljvujs2g2wywluid.onion |
|
|
⬇️ |
Never |
http://zf3raijx7m6xm72uenqrql5b2qtkbvnxi7fgzqjxfcizp7lylmvzvdid.onion |
|
|
⬇️ |
Never |
http://zu4jfbwu4on24mvtxm3gojoaw6ltk4wlebtfvly4haykp4tusdcrv5yd.onion |
|
|
⬇️ |
Never |
http://nnkx3zqi3whqyxh4edu5gpydeni3rzzyxoicsvevni25a5jdoc5xceqd.onion |
|
|
⬇️ |
Never |
http://evy3ssetplcrv5rzzzbxia75oroocvrhavc72pfy75e47g4zfz4vfwyd.onion |
|
|
⬇️ |
Never |
http://dou6ktqds2xidxlvwuqgruos2mjnqcbsdoeensjoolmzz2gby6uqe4id.onion/ |
|
|
⬇️ |
Never |
http://pcpokxdz5zn3tmzfbqyyfuodm6pkgrysiqcckbahzgyzirx2av44w4yd.onion/ |
|
|
⬇️ |
Never |
http://y7d2iez7vkt7yzpk6cmrxmntqxgrrizqmmi4oxpyv6g2rl4bn4xew3ad.onion/ |
|
|
⬇️ |
Never |
http://koh3nn7qf3xty73fewu7kuj7w2trzt5yuoj7babbuhzdknuwhpct2qyd.onion/ |
|
|
⬇️ |
Never |
http://2wwpi2kstrba4t3i5or3soqgvcc7luzpxntqfd2dya6kdmfdqj3sr3qd.onion/ |
|
|
⬇️ |
Never |
http://6rtliyde3asuj5k6jfnjrbogsni3zogbqybs3jpqfc7qc7ukeebzzwyd.onion/ |
|
|
⬇️ |
Never |
http://tqduzttjebt7vz3vla2mwe26bmjty7p7gvs4dhyzc4w6hzrgxfljr3yd.onion/ |
|
|
⬇️ |
Never |
http://qf62tupgogwy34gn5jt2ewpe2bdxpb7idzmrdu4axdznuuezxbtk7aid.onion/ |
|
|
⬇️ |
Never |
http://iromfhuademn34fsfdvdrobxdj3tz7mfp2rdj4o2nmfp55fr6xgm3hyd.onion/ |
|
|
⬇️ |
Never |
http://4qcwvs4nciukxpxls3lpcozkabqa6l3iaulgbm7lxssnlpv7clnz4lad.onion/ |
|
|
⬇️ |
Never |
http://3eu5bvf4d432dprtsdu3evlr6pxbbewxncnzjkib2ffp5osuxwzaa3id.onion/ |
|
|
⬇️ |
Never |
http://fe2pbzsazb4eh76tpn4hqo63erhuusyjlvio5msocqeibz3culyg63ad.onion/ |
|
|
⬇️ |
Never |
http://qosur3hbdiz4jok45wnfwz3gtf7mxbzurpgoqtejlwncoqlhmaousxqd.onion/ |
|
|
⬇️ |
Never |
http://s4xsrikoxn4wo2k4julmxyxryiiv2nrqke4jz7ybpk73m4cpzadjpxqd.onion |
|
|
⬇️ |
Never |
http://qmbvp3z7x55c2p6deewt4irg2i6xdzswgsg6ihtgwd3mf6w22i36s3yd.onion/ |
|
|
⬇️ |
Never |
http://6vnrkxk3z5sw3l56n3qrl4rwzq5acdxhupjigc34zofgebnzdfjkkbad.onion/ |
|
|
⬇️ |
Never |
http://thv7beevnkocwviamffpzd3tobl67fvcbrd637ok5xzmxlqltmkvtmqd.onion/ |
|
|
⬇️ |
Never |
http://yczpqk7e7plndnhjjza4jcq3yagd6djdfpnal4sgabna2vkccxr56cad.onion/ |
|
|
⬇️ |
Never |
http://cou6hffzhudgz57olebxcn5wr2zn25w3yrk7j4jci3dtkrxxqs7foxid.onion/ |
|
|
⬇️ |
Never |
http://xbrljl5nlnt65x7aqne4lbiy2rwgjpro5ng54dy5hfexsnvtawqi4jqd.onion/ |
|
|
⬇️ |
Never |
http://67ni6yaafbculxsbupuzageg2eselgc7bc6gkvc43tt2zhlh7jgmkoad.onion/ |
|
|
⬇️ |
Never |
http://dx3nurcicb2rzydbkam7eibrlrpxnjnfvkj2557wzgvmz7be2hn6ufid.onion/ |
|
|
⬇️ |
Never |
http://yv7fbzjdvg4e3fdgxnnq4oepu2wk6kuhhfuc36gzr7szxg7crjhorryd.onion/ |
|
|
⬇️ |
Never |
http://bl5h2vwa6jepjog4aviyv5garfvz4bc4t5tk6ioyaae4m7zoflb36jid.onion/ |
|
|
⬇️ |
Never |
http://p3yzpoltrm3e65rlqtmwefnunyz22wdjuaf4bfumqbey4edaeqq44did.onion/ |
|
|
⬇️ |
Never |
http://xoa7whcgymujxkwepyapthy7bhdc2epokgiau3ybuhgamrf3pxi4z4qd.onion/ |
|
|
⬇️ |
Never |
http://ysg5zoxqeabi5xejxbq43lvdrztyu4hnlrakckc72iko4peg4twh6vqd.onion/ |
|
|
⬇️ |
Never |
http://lmkgzahy3yya7bwmkmigx6j32d7u7nqex6hbx5izz7y3n6uwjx3as2qd.onion/ |
|
|
⬇️ |
Never |
http://figqod3no4syanbp2b2eqtao7dmxauj6bb2bnkx3gdmgqjlqhe5beaqd.onion/ |
|
|
⬇️ |
Never |
http://7x2vezv3s2vjh5h36hh2iovz53bi2qtlzcflkojedphny2mms2ok5cad.onion/ |
|
|
⬇️ |
Never |
http://kokaplp6lcwfwjkotajkn2ggf4lid5trsgzhg32cbsjopmyfytyhubyd.onion/ |
|
|
⬇️ |
Never |
http://ayzkcslvoiiahzrhqtc6zhe44mql5oqmbe6tyxljfhph26lbxtdqqlyd.onion/ |
|
|
⬇️ |
Never |
http://wake57gge7jfbrjssm65yac6fewan5nth5hhlcg7lorvmpxsnknf4xqd.onion/ |
|
|
⬇️ |
Never |
http://7nylg5iafpqfbpad6gtfkj22kp74iihr6lxtn3qmpgpasazqeb7cabad.onion/ |
|
|
⬇️ |
Never |
http://7z7aukowd72il3iobtboovofkqdluuva3bz5iwfazf4xwsdqpputukyd.onion/ |
|
|
⬇️ |
Never |
http://wb52j3p5alcgno3oczubcqflq7v6ilta3pcqneu77l5bujpiib6ixdad.onion/ |
|
|
⬇️ |
Never |
http://5xble3ivix7mjdfwd5232g2hegofrcithkwxb3vj7skwstnkose2p2qd.onion/ |
|
|
⬇️ |
Never |
http://qkypx555r7e5ukg4bso3iqqagfxhedq3tqq7f3iipbv6smv7hkp53hid.onion/ |
|
|
⬇️ |
Never |
http://g7p4ildkspr57fflg2f4fvektshe7mmzprkol746vsyqdsshgufwoqyd.onion/ |
|
|
⬇️ |
Never |
http://iln5j3cnabk3ftczrwwh2z7rdilnvkc426po3ogqb3y222xwqxizy2yd.onion/ |
|
|
⬇️ |
Never |
http://i4utqt3qnrm2hxhvitunmj4b7777svzbzrc4ewig6j4g6g5zzqahz2qd.onion/ |
|
|
⬇️ |
Never |
http://nhrlosgix7xlkriwvygx52v5jvxn6cb5cpl5gfmhg2dtyvyb7a467iyd.onion/ |
|
|
⬇️ |
Never |
http://jtred7eoefpgm5ztmh23zclbu5ekzpyjo52iw4d56n6e3bcslcxpjuqd.onion/ |
|
|
⬇️ |
Never |
http://zboneu6najwucvrfjac5gc6psuthqoz27x6fpiiuvttulph5aqz4qwid.onion/ |
|
|
⬇️ |
Never |
http://cgfblcrvlj5w7ebescbqftb3yfmc3qyo3n5p6vuvfouoagglyjlhmbyd.onion/ |
|
|
⬇️ |
Never |
http://dyl5qyy6yb5r74xb433h6ushzg3c2y22ec5h7h66pxarnaoxufjmyxad.onion/ |
|
|
⬇️ |
Never |
http://bvzv2g6falu42anoejm2lqc6l7vh5upojbhwgi6dxvxksjuw27s4vkad.onion/ |
|
|
⬇️ |
Never |
http://youje56g7jlgmqwhxat7ua7ysmmm4vogmrcq7cryod32bmzba37l27yd.onion/ |
|
|
⬇️ |
Never |
http://aayeie6my37ka7eefln7nnzabwidh7jj4bzcjykgblpmjomruk3tvjyd.onion/ |
|
|
⬇️ |
Never |
http://5un4e2c2cf6cfguw7uo2xyo5dnsctnuh3znahrmuibdjbspyu3byhzqd.onion/ |
|
|
⬇️ |
Never |
http://ok3dimj5y3g53dpmhlvhzwujaefzdey5kg6feftvc6coubssglfkilid.onion/ |
|
|
⬇️ |
Never |
http://6it5uyalzfdm37jenradhm55gocsflhhykgu7uts4me4y3xxmqfbnuqd.onion/ |
|
|
⬇️ |
Never |
http://7qkuhmqkltor7szib66etg4qywk7i2hzjgpkktt25ulytf6rlwi43mad.onion/ |
|
|
⬇️ |
Never |
http://bo2s5jld3oihh7hrvx4phucfhxedfjf2szsuvk4nylbexz62bxd3mfyd.onion/ |
|
|
⬇️ |
Never |
http://asvbfh7ahbnxijciovwijfr23yua4pjz3e5ha4y6vzankdqn5b4a2lqd.onion/ |
|
|
⬇️ |
Never |
http://zvi7ejdaod3v2obbacrtkao427p4xuigxfy656plngti6vw27st5tqyd.onion/ |
|
|
⬇️ |
Never |
http://f3oc5fzkfhftqajilnvofdhzy4hhwrzq4sv5pc4gkp5rv4ezvz7vd6yd.onion/ |
|
|
⬇️ |
Never |
http://3nnwjjrje6lpisqybb3n2qvplv3fjokwc3qrx764a4lbvgyjmcbbveid.onion/ |
|
|
⬇️ |
Never |
http://xvxa63spw6llq27eag3oesph4dfcyf3e4i3du5s3dbvrsikp4dg7jyid.onion/ |
|
|
⬇️ |
Never |
http://c2jylvw3ngkppt3ypvjtk7sx6fyli6mddvcrjihn3lyfeqkgbhxdvaid.onion/ |
|
|
⬇️ |
Never |
http://2zxwt43zxq2d4wrgbxtxstcvv3sl2bq7t2udd6iifkmea2a3d7js3aqd.onion |
|
|
⬇️ |
Never |
http://7ctoklhp3yp5gxile3s57dusuvwozfav4r4hhhszbr5zg43rv4rgmbyd.onion/ |
|
|
⬇️ |
Never |
http://pedsqcmmkfi7p2kdrg5f2uz2ko45oeby3zmyccm37pw3xoflngfdedqd.onion/ |
|
|
⬇️ |
Never |
http://olmvtwarcgoqreayhpjhxtl7tozj5fnmyavzj5jphyy4d2qccio4klyd.onion/ |
|
|
⬇️ |
Never |
http://qsmu6ufeelmqfzk5odx2rlg23ic46q7eamemi3ho23qads3wkqo6pmid.onion/ |
|
|
⬇️ |
Never |
http://7fncnamu5ghwrj43qifs3nf7xeif4kgd2olcpt636yz4n5cm5nd7gvyd.onion/ |
|
|
⬇️ |
Never |
http://med6cjvoucuksae7f7bdbyql26peuqe2pyurw6zshepumnhl3qyntsyd.onion/ |
|
|
⬇️ |
Never |
http://3tdyvf3u4xko2xbra3bi4qsj2pedqdkglxkgfofyqip2sljxdbwyymyd.onion/ |
|
|
⬇️ |
Never |
http://zyb7j23sfsert574hii342lwnz7qeyw2kb7zom74wjabwhifhpoknaqd.onion/ |
|
|
⬇️ |
Never |
http://glt2d33vz3snwvqlje6qrw5khsej7auow4nxnvelwh7udq7df6vnblid.onion/ |
|
|
⬇️ |
Never |
http://pl6muez3z2vulhixcyipmi6n5xaynkew6umjhhv64xg2baomk6pzzayd.onion/ |
|
|
⬇️ |
Never |
http://rjwjksouddfq3x2jzieb6k7gpkjv7ukyfwqinterxtbtrsoipk6qedad.onion/ |
|
|
⬇️ |
Never |
http://wpsi2cbbm3ckhgizllilxohq3ejpvj2m34grvcmx76eqwtrhzjeo7ead.onion/ |
|
|
⬇️ |
Never |
http://zkvwuf2mzqs33vuvhk3pxk3jphvps3ldivwa5qljyryj673mbszjrnqd.onion/ |
|
|
⬇️ |
Never |
http://onnaqkbezn3c2c667lp2bj6ycmns557i7lqr2ms7w25ed63745rbreyd.onion/ |
|
|
⬇️ |
Never |
http://oaiogo6dhwk7buevuib5awotcu2gotscqq2twthygxsagtnmp2zcbcid.onion/ |
|
|
⬇️ |
Never |
http://rjztxzrwzbdgas53v23g5sgmtl7nb7qplrzu3x7b4n2dsy5uq54vgyyd.onion/ |
|
|
⬇️ |
Never |
http://7q4ha572hakhru54jxonbpnhch3nlhwdw7ughj5j3jhiyyr2lflxojqd.onion/ |
|
|
⬇️ |
Never |
http://q4pno5sryymcs27txqv7ypmp4lb3z7fyh3mpvk7asqun45wvrq3mprad.onion/ |
|
|
⬇️ |
Never |
http://esb67w4m3uhizvoyt7dhcnxj22iv4eq5uiuyysrljn36jf376y4dcyid.onion/ |
|
|
⬇️ |
Never |
http://xsny4ojubybbn6pe6zhrrflggu6lbq3ir3ixcpbtxzplwwjqi4dqidqd.onion/ |
|
|
⬇️ |
Never |
http://3b4bsnquxnxqh64xd56ouav2epxqzrbkbm7j767nwq2lnmtpo7atqmqd.onion/ |
|
|
⬇️ |
Never |
http://4cc2rnrc4jycvf5kagldnusszmrjdpytm4smhs6gmwvci2l7wlqytlad.onion/ |
|
|
⬇️ |
Never |
http://sbpfz6p7uryiuv75rnhl324nazcwsjmaaf6z4o2kiic2tbiguts6hbad.onion/ |
|
|
⬇️ |
Never |
http://epjpr6zxovifiwo2hwcc2ybrqbud4qbk3sc2swqsz3zduoluw5dvnvyd.onion/ |
|
|
⬇️ |
Never |
http://7evca3nibwfav5knc2ksid4khqd7ycgdn6u75r6zjuyytb4vmawxdmad.onion/ |
|
|
⬇️ |
Never |
http://has6dlzs5mbxl2xkh4exhvg2k4hx4ijpntkpnbhdi37ecqv7ekxu5vid.onion/ |
|
|
⬇️ |
Never |
http://utuc2ul4pdmomok4uozskzumjdh7jk2pjab5suquszybcfkvmfd2lrid.onion/ |
|
|
⬇️ |
Never |
http://eiv53oqiermgz7o5bt3ct4aaedme3qx6l7cmk3sedx2m6njt43bo4vid.onion/ |
|
|
⬇️ |
Never |
http://6rix6baa5hvfukufxynvnisglz6j3xxemu56zpxpyglbvnkl6ekd2uyd.onion/ |
|
|
⬇️ |
Never |
http://gtjoeyd6kus67etnla2dzmxpfd43lozfrwwyozc4pr3jdnu3bericxad.onion/ |
|
|
⬇️ |
Never |
http://6o345jyfcsrep5dcaqrgd3vv636ctwri44u6fpy4soxg3se7iqhtdgid.onion/ |
|
|
⬇️ |
Never |
http://tjmo27stmgvg45k3jltnk2zi6xglze2ml7tgx5ihkacrewabdgcw4bad.onion/ |
|
|
⬇️ |
Never |
http://prbabjw42fjlzveba3q3wlo47jy2ksa76e2fnkt4tftyvylv32lv7lqd.onion/ |
|
|
⬇️ |
Never |
http://ic6owbrtkkymvcyxlvqzocungo54veltezfbvr7dgss4xioi5kfjb5yd.onion/ |
|
|
⬇️ |
Never |
http://bx6b255itzvrlprn7kzdzjg6bly54irlox5csndcbymtfaqecjyfv3qd.onion/ |
|
|
⬇️ |
Never |
http://f646peycufbfenfevgpgl7kipwd6j4wez6m2phbgtckufnqiq3cedxad.onion/ |
|
|
⬇️ |
Never |
http://ywuqjgj4nnp7sii4ufpqriwinvm5onbxpemr5e6i2bve6nviirqkugqd.onion/ |
|
|
⬇️ |
Never |
http://yqnzk23gtyf7ayrsgvo6xstbc7mi4j2g4ux5trnqygjbccmvl6q6qfqd.onion/ |
|
|
⬇️ |
Never |
http://tquqffwz5qepxnqtcd5ei3bzqjsyds2g2ywbxxr46nb2z4h7g2jlsjyd.onion/ |
|
|
⬇️ |
Never |
http://snmb65b36sfmx7os37mzqrrmu2zdon237qvafg5p5274nint7i655uqd.onion/ |
|
|
⬇️ |
Never |
http://jow26ytlhvkjjc4dluier5y5ma2bbusexyczpgtfzdx4sh4dzmndbpid.onion/ |
|
|
⬇️ |
Never |
http://acbyrlcgiv6qotpdynv7fu3bpyqtcbo3g3xqqhxrixrrlr2iiasbzzqd.onion/ |
|
|
⬇️ |
Never |
http://uduar2yzjwxbrjjnajaoe6y4nlnfx7bighampsukuwc5ibvcpit5okyd.onion/ |
|
|
⬇️ |
Never |
http://xh23q4ps4lgsbkiifbztqt2w7cacjbkv7b3rpl3o6id262lqwmzooyqd.onion/ |
|
|
⬇️ |
Never |
http://y5qmdnyxbvbx7l2uudjgc4nrlwo6zqhvevr3v5ux5ln7dg2yxvnjcvyd.onion/ |
|
|
⬇️ |
Never |
http://kqmsxmbzkw33qgnbanoaaekuqa65qtk6777w4mkqku4r5kmksk2agtid.onion/ |
|
|
⬇️ |
Never |
http://u237r6z6axkagn6t2qiwx2rrvmq7pvz53tph7hl64geg3ee55gw66kad.onion/ |
|
|
⬇️ |
Never |
http://kqpmhriaqt4kujfnm3wv7ujgzx5pujqqd4logzgzzq3w5wctm62c5uid.onion/ |
|
|
⬇️ |
Never |
http://o76kftemw4lz2dmbaqlkvlq263cbb2twdy5q3767xb42zs7ovvu3yiqd.onion/ |
|
|
⬇️ |
Never |
http://qnjf77dap5e34rw56triaklvaepxeebrku5iaqpnzsm6dy2fyob6csid.onion/ |
|
|
⬇️ |
Never |
http://3hqc4b7iimn3rltumz2l7qbzw4bcx6mgkvbm6yzlkzpcauzmlpqucgid.onion/ |
|
|
⬇️ |
Never |
http://ajtwxvgqssarrfbgbctqrmujf75hbj5l3yu75du4jdhgigiu6e5xosad.onion/ |
|
|
⬇️ |
Never |
http://l7fuh4h4wiseaarmysosohdsfjyya3nkqqx7o74k7wa63ajvalb4g5id.onion/ |
|
|
⬇️ |
Never |
http://qojfcbvlumvzmiu4tyixawquk6bjiwv74aeaubxwtq7rmw4qq7sv2jad.onion/ |
|
|
⬇️ |
Never |
http://cs5c7mye7anrko6axmio5ebugh6gnqas4jbznf4po47i6gfuzuk4zeyd.onion/ |
|
|
⬇️ |
Never |
http://4ozcr5lsrsdxbo3kuqbayykrrl23j2yzmkc7ucgvsu7ejhwlzktzxcid.onion/ |
|
|
⬇️ |
Never |
http://dvvn42vb7umu2ldio424mlwhirmi2isxhbmdbhwbcnbhiekovdwe62qd.onion/ |
|
|
⬇️ |
Never |
http://ra4uys2f4pslov55oj23ckudpbmovj7brrqqnzwu25ux5ul62crbkryd.onion/ |
|
|
⬇️ |
Never |
http://ef4rbuuqzczn2jah6tafzehoglye46vngv55pnddilmh7srpwpfa5fad.onion/ |
|
|
⬇️ |
Never |
http://5azi3hg5bhi37z3dwivqrwhooos4wefome5fdbnz3n3kxvzaycqqd2id.onion/ |
|
|
⬇️ |
Never |
http://zcvqzunsmuotuiw7biqbsacf75uam7rvsfa46ppqwncpt2jxp3x5ryad.onion/ |
|
|
⬇️ |
Never |
http://b34sad6mkvajaffq42fahjiharyfvxwg2va5ybwa2zl5srhmhdhwdqyd.onion/ |
|
|
⬇️ |
Never |
http://xxulor6gj34lqgvj25t6h2giqqic7puhd4khctkr4xb7gsnfdxewfvqd.onion/ |
|
|
⬇️ |
Never |
http://6424n6oazcc5r2waycgrnu57lorupzvcjjphqhu75pn4atcd6oedjgad.onion/ |
|
|
⬇️ |
Never |
http://pfdyhkswxf33nkjlbm2h2lluujca7tdcbmpwd74x5muv4aj5qenaj4qd.onion |
|
|
⬇️ |
Never |
http://u65evpr7ejtac7cfi3getxwehllwgjdjgkxvrvjq2dmetjuj2uuii7qd.onion/ |
|
|
⬇️ |
Never |
http://7u36ktiv5idgyhyyeociikvftwfkaihisndnqick4qoe4wssjphdihqd.onion/ |
|
|
⬇️ |
Never |
http://ezh5qco6s7hju7uutdogqebrrq6qn3gixodtdnks6t6bbumw4n6c4aad.onion/ |
|
|
⬇️ |
Never |
http://kwjsef73vtinlkt7t4hp3qsjga7uue65elq7jgmtovejsemhp56mnyqd.onion/ |
|
|
⬇️ |
Never |
http://fymqpsou7kwvovkh5uxr4ehwd2tibqhmp25p2mzoi2thtrcstwb2ojid.onion/ |
|
|
⬇️ |
Never |
http://tslnzzg2kkczuo44rdoqkskzaopsqnhrm54bq5sfocxc2fvzll5roqyd.onion/ |
|
|
⬇️ |
Never |
http://g5a2thsvpabyjp6prphsque7nyaauul4rryr2nulytakggkecls23bad.onion/ |
|
|
⬇️ |
Never |
http://authil5bvxkjdiwk7qmdxhxlu2mfinm4hhdcnv24chrc5wzvua2kadad.onion/ |
|
|
⬇️ |
Never |
http://ni2bv45lwna3rshqcmr5hegowp764qhzooi42bddf52557uhaafbdvid.onion/ |
|
|
⬇️ |
Never |
http://ajdtbop62plz3s2uw3rjtegilw4lfmixl7h4p6oset5rq5jihwtehtad.onion/ |
|
|
⬇️ |
Never |
http://3xa42kwkeiwzhjybddfeifad7vn2kvsslybquledvib5xsfkylwtwyid.onion/ |
|
|
⬇️ |
Never |
http://4qmsi7vcdrrutxapxbc7eofjjzfsvam3fehgmk6xyivwcroqkqjij5qd.onion/ |
|
|
⬇️ |
Never |
http://3id2g6u3dwvg7nsarfkgsdf3odp5hb7owvnoqbipbisekudptetuxtad.onion/ |
|
|
⬇️ |
Never |
http://g7btluffqpexhytokv5yjvbksuzcp5ngt5jkcsvnuhajsl42q6s7fpyd.onion/ |
|
|
⬇️ |
Never |
http://kgu25rbtoh5v4s65pcsahocn62m6lo3u42odko6dm2oqfg5mzz3zsnid.onion/ |
|
|
⬇️ |
Never |
http://knt3cs4tkxqdnrjrzk3n7txyhb6c5szkgjwy74jomyvy5xuli5qcdsid.onion/ |
|
|
⬇️ |
Never |
http://2ehvy7e4ng3hcqp2e6af4pnnhehn3wi6ts5ulal4qtpc73c6y67x4eyd.onion/ |
|
None |
⬇️ |
Never |
http://32b2vdt4nrljyqwinwtqxzech5lqxtj7knkhkgk7akv5b4mfb456lhid.onion/ |
|
None |
⬇️ |
Never |
http://ihoqnxnvdwybrv6kiteiesjc3ic6du6axtv3arouxr6ddswrxa2wrbyd.onion |
|
Description
Amnesia ransomware was first identified in May 2017, particularly affecting enterprise cloud environments. It does not appear to operate as Ransomware-as-a-Service (RaaS), and there is no public indication of a provider-led affiliate structure. The extortion model is single-stage—primarily file encryption without documented data theft or leak threats. It targets specific file types and resets their modified timestamps. Encrypted files may receive suffixes such as .amnesia, .@decrypt2017, .[Help244@Ya.RU].LOCKED, .CTB-Locker, and several others. Common ransom notes include files named HOW TO RECOVER ENCRYPTED FILES.TXT or RECOVER-FILES.HTML, typically placed in every folder. Executable names associated with its delivery include variants like guide.exe, update.exe, Happier.exe, bstarb.exe, among others. The encryption algorithm is AES-256, implemented in Delphi, and victims are instructed to contact the attackers via email addresses (e.g., decrypt@india.com). No high-profile incidents or geographic patterns have been publicly attributed to Amnesia.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://ankexpn6vk3qc5ooyyj7ufi6nmyt44vxbjtbxxkq4bxo7xzghai7kiqd.onion/ |
|
Description
Antibrok3rs emerged as an access broker (not a ransomware operator itself) linked to the aftermath of the 2023 MOVEit supply-chain exploitation. From November 2024 through early 2025, this actor has posted stolen data from at least 15 energy-sector victims, including U.S. utilities such as CenterPoint Energy, Entergy, Nevada Energy, and Appalachian Power—data likely obtained via the MOVEit breach. While some analysts suspected ties to the Cl0P ransomware collective, Antibrok3rs publicly denied any such affiliation. The extortion model centers on data leakage without accompanying file encryption—a purely leak-based threat. No delivery, encryption, or ransom note behaviors have been observed, nor is there evidence of RaaS activity.
Links
Page title |
Available |
Last visit |
URL |
Screen |
One moment, please... |
⬆️ |
2025-08-20 |
http://antibrok3rs.ir/ |
Screen |
Description
Anubis is a financially motivated cybercrime group primarily known for its banking trojan operations but also linked to ransomware activity targeting corporate networks. First identified in 2016 and evolving over time, Anubis ransomware attacks have targeted Windows systems, often deployed after initial compromises by the Anubis banking malware or other access vectors such as phishing, malicious email attachments, or exploitation of unpatched vulnerabilities. The group’s ransomware encrypts files using strong symmetric encryption algorithms, appending distinctive extensions and delivering ransom notes with payment instructions via Tor. Anubis has targeted multiple sectors worldwide, including finance, retail, and government, often combining ransomware with credential theft and data exfiltration to maximize pressure on victims. Its infrastructure and tactics overlap with other financially motivated actors, suggesting possible affiliate or shared tool usage within broader cybercriminal ecosystems.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Anubis blog |
⬆️ |
2025-08-20 |
http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/ |
Screen |
Description
Apos ransomware surfaced in April 2024 and is best characterized as a data‑broker or leak‑only operation, rather than a traditional file‑encryption ransomware. It has not been observed to conduct encryption, but instead focuses on data exfiltration with threats to leak or sell the stolen information. Targets span sectors such as technology, healthcare, manufacturing, business services, telecommunications, and government—with significant victimology in Brazil, the United States, India, France, Paraguay, and Spain. Reporting suggests its activity tapered off after a few incidents, possibly indicating a one-time campaign or short-lived operation. Though some sources list multiple victims, technical details such as encryption algorithms, ransom notes, or extortion pricing are not publicly documented. Apos is sometimes listed among new or industrial-focused threats observed in Q1 2025, but remains poorly defined in public technical intel.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Notion – The all-in-one workspace for your notes, tasks, wikis, and databases. |
⬇️ |
2024-05-25 |
https://apos.blog |
Screen |
Rules |
⬇️ |
2025-04-06 |
http://yrz6bayqwhleymbeviter7ejccxm64sv2ppgqgderzgdhutozcbbhpqd.onion/rules |
Screen |
Apos Blog |
⬆️ |
2025-08-20 |
http://yrz6bayqwhleymbeviter7ejccxm64sv2ppgqgderzgdhutozcbbhpqd.onion/ |
Screen |
Description
Aptlock surfaced in early 2025 and is characterized by a single-extortion model combined with threats of data leakage. The ransomware encrypts files on Windows systems, appending the extension .aptlock, and then changes the victim’s desktop wallpaper. Victims receive a ransom note named read_me_to_access.txt informing them that their critical company data has been exfiltrated and will be deleted or leaked if they don’t act. They are given 72 hours to initiate contact via Tor-based chat access (using credentials provided in the note), with further warnings issued if no engagement occurs within 5 days. Specific details about intrusion vectors, encryption algorithms used, or known affiliate operators remain undisclosed in public threat intelligence. No reliable evidence links Aptlock to Ransomware-as-a-Service operations or lists any known affiliates.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://sr3b2uzrzzubagq64savzjjarul6bacpk6onddobj72gqkdjgm5z4qyd.onion/ |
|
Description
Arcane first emerged in mid-2021 under the UNC2190 cluster and later rebranded as Sabbath, continuing its operations against critical infrastructure like hospitals, schools, and educational entities. It follows a double-extortion model—encrypting data (using ROLLCOAST/Eruption malware) while also exfiltrating sensitive information and threatening to leak it. Victims have included institutions in the U.S. and Canada across sectors such as healthcare, education, and natural resources. Initial intrusion tactics involved deployment of Cobalt Strike with custom profiles, DLL-based in-memory execution, and signed TLS certificates, plus use of stealthy GET requests ending with “kitten.gif.” Specific encryption algorithms or file extensions have not been publicly confirmed. The group appears to operate in an affiliate-style model but remains under single management rather than a full RaaS platform.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
ArcRypt (also known as ARCrypter or ChileLocker) was first identified in August 2022, originally targeting government entities in Latin America and subsequently expanding globally. The group employs a single-extortion model—there is no evidence of a data-leak threat or RaaS ecosystem. The malware encrypts files using extensions such as .crypt, .crYpt, and .crYptA3, and uniquely drops the ransom note before commencing encryption. It has variants for both Windows and Linux, including a Go-based Linux version. Communication with victims occurs via Tor-based portals, evolving over time from a single shared site to individualized mirror sites for each victim. In some cases, threat actors have instructed victims to contact them using Tox, creating a Tox profile for communication. Targets have included Chile’s government infrastructure, Colombia’s Invima agency, and organizations in China and Canada.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Arcus Media first emerged in May 2024 and operates as a Ransomware-as-a-Service (RaaS) with a double-extortion model—encrypting data and threatening to leak it if the ransom isn't paid. The group leverages advanced capabilities including selective encryption (partial encryption of large files with the ChaCha20 cipher and RSA‑2048 key protection), privilege escalation, disabling recovery mechanisms, and terminating critical services like SQL servers and email clients to maximize disruption and thwart defense. Initial access comes through phishing, credential theft, or exploitation of vulnerabilities, with lateral movement facilitated by tools like Mimikatz and Cobalt Strike. Since its debut, Arcus Media has — by mid‑2025 — been linked to 50+ confirmed attacks, spanning industries such as business services, retail, media, healthcare, and manufacturing across the Americas, Europe, and Asia. Victims include high-profile targets like Braz Assessoria Contábil and FILSCAP.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
A r c u s |
⬇️ |
2025-08-16 |
http://arcuufpr5xxbbkin4mlidt7itmr6znlppk63jbtkeguuhszmc5g7qdyd.onion |
Screen |
Description
Argonauts Group is a data extortion operation that surfaced around September–October 2024, primarily targeting organizations in Italy, as well as entities in Taiwan, Japan, Canada, and the U.S. It does not appear to use conventional file-encryption ransomware methods—instead, it steals data and operates a dedicated data leak site (DLS) to pressure victims into paying. Victims span sectors like technology, manufacturing, transportation/logistics, and healthcare. The group has claimed to steal substantial volumes of sensitive information—e.g., 200 GB from Ivy Life Sciences (Taiwan) and 140 GB from Japan’s Zacros—and publicly disclosed some samples on its leak site. Although some references imply prior activity back to October 2021, these appear to be less reliable and not substantiated by authoritative intel. As of now, there is no clear evidence of traditional ransomware encryption, ransom notes, or RaaS infrastructure.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Argonauts |
⬇️ |
2025-03-27 |
http://jbmk7h6xlkedn2gg5yi76zca6y3jgdlp5wchlsrd7735tlnrmmvqe5ad.onion/ |
Screen |
Fill in the form to start a chat « Decoder |
⬇️ |
2025-03-27 |
http://4xi5jklauqmjfkwxhs2a6q2d26v2465zfnccacqpz75exv2kzu5aeiad.onion:18080/chat/startchat |
Screen |
Description
Arkana Security emerged in early 2025, debuting with a high-profile data-extortion campaign against the U.S. internet provider WideOpenWest (WOW!). The group does not appear to deploy actual ransomware encryption; rather, it operates a data-broker-led, leak-centric extortion model, with a structured "Ransom → Sale → Leak" progression. Victims so far include WOW! and several other organizations across sectors such as telecommunications, mining, finance, electronics, and music/entertainment, spanning the U.S. and UK. Arkana facilitates its threats through doxxing and "Wall of Shame" tactics, leveraging psychological pressure rather than encrypting systems. Its operations are characterized by post-intrusion lateral movement and deep backend access.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Arkana Security |
⬇️ |
2025-07-06 |
http://arkanabb66ee4nsdji6la2bu6bwqe3dbtsyf3rxrv6vhiehod7utagad.onion |
Screen |
Arkana Security |
⬇️ |
2025-07-06 |
http://ransomwvbabemdnwl7lzgeenyfmmhskaed6jcruwhkvapsia76vttzyd.onion/ |
Screen |
Description
Arvin Club first appeared around early to mid-2021, debuting on its Tor leak site with posts dating back to May 5, 2021. While frequently characterized as ransomware, there is no verified evidence of file encryption or RaaS operations—its behavior aligns more closely with data-leak and hacktivist activity. The group actively publishes stolen data via its Onion site and maintains a prominent presence on Telegram, operating both official channels and group chats (notably with Persian-language content). A known target includes India's Kendriya Vidyalaya school network among others. Arvin Club has shown ideological leanings (notably support for REvil) and claims to have “hacktivist” motivations, including activities against the Iranian regime. No encryption algorithms, file extensions, or ransom notes have been publicly documented.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Arvin Club – آزادی برای اتصال |
⬇️ |
2022-08-01 |
http://3kp6j22pz3zkv76yutctosa6djpj4yib2icvdqxucdaxxedumhqicpad.onion/ |
|
Arvin | Blog |
⬇️ |
2023-11-06 |
http://arvinc7prj6ln5wpd6yydfqulsyepoc7aowngpznbn3lrap2aib6teid.onion/ |
Screen |
Description
AstraLocker first appeared in 2021, likely as a fork of Babuk ransomware using leaked source code. It follows a single-extortion, smash-and-grab approach: distributed directly via phishing Microsoft Word documents containing embedded OLE objects. Once executed, it kills security and backup processes, deletes shadow copies, and encrypts files using modified HC-128 and Curve25519 algorithms, appending extensions like .Astra or .babyk. A “smash-and-grab” style attack, it’s less methodical than more sophisticated campaigns—deploying ransomware immediately upon user action rather than conducting prolonged network reconnaissance. In mid-2022, the operator ceased ransomware operations, releasing decryptors and announcing a pivot to cryptojacking.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
AtomSilo emerged in September 2021 and ceased operations by year-end 2021. It functioned with a double‑extortion model, combining file encryption with data exfiltration and leak threats. The malware uses a hybrid encryption scheme—AES‑256 for file encryption and RSA‑4096 to secure the AES key—and appends the extension .ATOMSILO to encrypted files. Ransom notes follow formats like README-FILE-{computer name}-{timestamp}.hta or ATOMSILO-README.hta. Structurally and operationally, AtomSilo closely resembles the LockFile ransomware and is attributed to the Chinese state-linked actor BRONZE STARLIGHT (aka Cinnamon Tempest, DEV‑0401, Emperor Dragonfly, SLIME34), likely serving as a smokescreen for espionage-driven data theft. Victims spanned multiple industries and countries, including notable high extortion demands up to $1 million USD. The group also exploited the Atlassian Confluence vulnerability (CVE‑2021‑26084) for initial access and used DLL side‑loading for stealthy deployment.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
AtomSilo |
⬇️ |
2021-12-17 |
http://mhdehvkomeabau7gsetnsrhkfign4jgnx3wajth5yb5h6kvzbd72wlqd.onion |
|
AtomSilo |
⬇️ |
2022-01-25 |
http://l5cjga2ksw6rxumu5l4xxn3cmahhi2irkbwg3amx6ajroyfmfgpfllid.onion/list.html |
|
Description
Avaddon is a ransomware malware targeting Windows systems often spread via malicious spam. The first known attack where Avaddon ransomware was distributed was in February 2020. Avaddon encrypts files using the extension .avdn and uses a TOR payment site for the ransom payment.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://avaddongun7rngel.onion |
|
None |
⬇️ |
Never |
http://avaddonbotrxmuyl.onion/ |
|
Description
First observed in July 2021, AvosLocker operates as a Ransomware-as-a-Service (RaaS) platform employing a double-extortion model—encrypting files and exfiltrating data with threats to leak it publicly. Its affiliates have targeted diverse environments including Windows, Linux, and VMware ESXi, particularly impacting sectors such as education, government, manufacturing, and healthcare across the U.S., Canada, and numerous other countries. Affiliates gain access through phishing emails, exploitation of vulnerabilities (notably Microsoft Exchange ProxyShell/log4j, Zoho ManageEngine), and compromised remote services. Technically, AvosLocker uses AES (with RSA-wrapped keys) for file encryption, often executing in safe mode to bypass security defenses, and directs victims to ransom notes like GET_YOUR_FILES_BACK.txt while changing the desktop wallpaper. Its data leak site operated from mid-2021 until about July–August 2023. No activity has been observed since May 2023.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://avos2fuj6olp6x36.onion |
|
Description
AvosLocker is a ransomware-as-a-service (RaaS) gang that first appeared in mid-2021. It has since become notorious for its attacks targeting critical infrastructure in the United States, including the sectors of financial services, critical manufacturing, and government facilities.
In March 2022, the FBI and US Treasury Department issued a warning about the attacks.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
DDOS Protection |
⬇️ |
2023-07-08 |
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion/ |
Screen |
None |
⬇️ |
Never |
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion |
|
Description
Axxes ransomware emerged as a rebranded version of the previously known Midas ransomware group, with roots also tracing back through Haron and Avaddon lineage. It operates via a single-extortion model, encrypting files and appending the .axxes extension. Victims receive both an “RESTORE_FILES_INFO.hta” and a “.txt” ransom note. The ransomware performs extra actions like determining the device’s geolocation, modifying the Windows Firewall, changing file extensions, and terminating processes using taskkill.exe. Its known targets span the U.S., UAE, France, and China, including at least one high-profile victim—The H Dubai hotel. This group appears financially motivated, leveraging historical branding and code of earlier groups for its operations.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://ymnbqd5gmtxc2wepkesq2ktr5qf4uga6wwrsbtktq7n5uvhqmbyaq4qd.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://anewset3pcya3xvk73hj7yunuamutxxsm5sohkdi32blhmql55tvgqad.onion |
|
Description
We are AzzaSec — a decentralized PMC (Private Military Contractor), RaaS (Ransomware-as-a-Service) syndicate, and botnet operator at the intersection of cyberwarfare, asymmetric operations, and underground economics.
Emerging from the collapse of traditional hacktivism, we evolved into a sovereign digital force. We offer custom offensive solutions to clients with political, financial, or strategic objectives. We are stateless, leaderless, and loyal only to code.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
AzzaSec Reborn - Hacker Community Hub |
⬇️ |
2025-04-28 |
http://sebzpewd2zz7jap56r37icjee4pn5scss3mjxz74uq32ua2aa3n5vqad.onion |
Screen |
Description
B0 is a relatively obscure ransomware operation with very limited public reporting outside of leak site monitoring. It appears to operate a data-extortion model, with a dedicated leak site on the Tor network, and no confirmed use of encryption-based ransomware in documented incidents. The group is listed in ransomware tracking services from at least mid-2024, but there are no major vendor reports describing their victimology, intrusion methods, encryption schemes, or specific targeting patterns. Its branding and operational style suggest a small, self-contained group rather than a large RaaS platform.
Links
Page title |
Available |
Last visit |
URL |
Screen |
B0-Home |
⬇️ |
2025-05-08 |
http://bzsn5crutf7eiq5mlohn2n2lkaqcafp6tsr6g5b3y4rxbq4g32bg3uid.onion/ |
Screen |
Description
On January 26th, Babuk's dedicated leak site (DLS) was "relaunched". Bjorka (Telegram: @bjorkanesiaaaa) is the current administrator. Upon launch, the DLS was populated mainly by victims previously claimed by other groups such as RansomHub, Lockbit3, and Funksec. At this current time there is no apparent connection to the original Babuk operation besides reusing the Babuk site template and logos. The groups is also known as Babuk2 by other trackers.
It is important to note that the original Babuk DLS was hosted and available up until February 26th, 2024.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Babuk - Leaks site |
⬇️ |
2025-01-29 |
http://7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion |
Screen |
|
⬇️ |
Never |
http://gtmx56k4hutn3ikv.onion/ |
|
|
⬇️ |
2025-04-02 |
http://xeuvs5poflczn5i5kbynb5rupmidb5zjuza6gaq22uqsdp3jvkjkciqd.onion/ |
Screen |
|
⬇️ |
Never |
http://fpwwt67hm3mkt6hdavkfyqi42oo3vkaggvjj4kxdr2ivsbzyka5yr2qd.onion/ |
|
OnionShare |
⬇️ |
2025-01-28 |
http://57mphyfkxoj5lph2unswd23akewz3jtj7mb6wignwmyto32ghp2visid.onion/ |
Screen |
Babuk - Leaks site |
⬇️ |
2025-04-04 |
http://bxwu33iefqfc3rxigynn3ghvq4gdw3gxgxna5m4aa3o4vscdeeqhiqad.onion |
Screen |
Description
Babuk‑Locker emerged in early 2021 as a Ransomware‑as‑a‑Service (RaaS) gang targeting high‑value “big game” enterprises across sectors like healthcare, telecommunications, finance, education, and government. It initially deployed crypto-ransomware—encrypting files using ChaCha8 encryption with keys secured via elliptic‑curve Diffie‑Hellman—and later added a double‑extortion model involving data theft and leak site threats. Notable incidents include attacks on the Washington, D.C. Metropolitan Police Department and other organizations. In mid‑2021, Babuk’s source code was leaked, prompting both a fragmentation of its core operations and emergence of variants like Babuk Tortilla and Babuk V2. Affiliates exploited vulnerabilities in ESXi hypervisors to deliver destructive variants, and law enforcement actions eventually disrupted key operators.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Babuk - Leaks site |
⬇️ |
2024-02-26 |
http://nq4zyac4ukl4tykmidbzgdlvaboqeqsemkp4t35bzvjeve6zm2lqcjid.onion/#section-3 |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://babydovegkmhbontykziyq7qivwzy33mu4ukqefe4mqpiiwd3wibnjqd.onion |
|
Description
BabyLockerKZ is a variant of MedusaLocker ransomware, first observed in late 2023. It operates under a double‑extortion model, combining file encryption with data exfiltration and extortion. Technically, it reuses MedusaLocker’s AES + RSA‑2048 hybrid encryption, appends the .hazard file extension to encrypted files, and includes a unique autorun registry key (“BabyLockerKZ”) alongside dedicated public/private key data inserted into registry values. Initial access is achieved through opportunistic methods like RDP compromises, with lateral movement facilitated by compromised credentials and tools such as Mimikatz. The variant employs a custom toolkit codenamed paid_memes, which includes tools like "Checker" for scanning credentials, facilitating automation, and bridging toolsets for further exploitation. Starting late 2022, its operators have compromised over 100 organizations per month, initially targeting European victims before shifting toward Latin America in 2023.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
BackMyData is a variant of the Phobos ransomware family, first observed in early 2024. It follows a double‑extortion model: encrypting files and threatening data exposure. The ransomware primarily targets organizations via weak or misconfigured RDP access (e.g., remote desktop services), though phishing and initial-stage payloads like SmokeLoader have also been noted. Technical behavior includes AES‑256 file encryption, with keys secured via a public RSA‑2048 key embedded in the binary. Post-infection actions involve disabling firewalls, deleting volume shadow copies, inhibiting recovery functionality, and establishing persistence through registry Run keys and startup folder entries. Encrypted files receive the extension .BACKMYDATA, and victims are left with ransom notes (info.txt, info.hta, or .backmydata) that instruct them to contact attackers via email or Session Messenger. A significant incident involved a coordinated attack on Romania’s Hipocrate Information System (HIS), impacting 26 hospitals and causing widespread system outages across nearly 100 facilities, with ransom demands of approximately 3.5 BTC (~$175,000).
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
BalletsPistol is a Python-based ransomware strain distributed via GitHub. An investigative report from June 2025 reveals its delivery through a malicious ISO file hosted on a now‑removed public GitHub repository
tinextacyber.com+1
. The infection chain begins when the ISO (named Invoice.iso) is downloaded and mounted, revealing a batch script (MAIN.BAT) and supporting components—including a password-protected ZIP and shortcut (.lnk) for execution. The malware performs privilege escalation (via UAC bypass using fodhelper.exe), persistence via registry and scheduled tasks, and then extracts an executable from the ZIP to commence the main payload. This binary encrypts user files with a hybrid AES + RSA scheme, adding the .iDCVObno extension to encrypted files; it also drops ransom notes (RESTORE-MY-FILES.TXT or .HTA) and changes the victim’s wallpaper.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Beast ransomware emerged in 2022 as an enhanced iteration of the earlier “Monster” ransomware. It operates under a Ransomware-as-a-Service (RaaS) model, offering affiliates rich customization options to create tailored binaries targeting Windows, Linux, and VMware ESXi systems. Key technical capabilities include hybrid Elliptic-Curve + ChaCha20 encryption, segmented file encryption, ZIP wrapper mode (encrypting files into zip archives with embedded ransom notes), multithreaded processing, termination of services, shadow copy deletion, hidden partition usage, and subnet scanning. Affiliates are provided configurable offline builders, enabling streamlined deployment across multiple platforms. While Beast's functional power is well-documented, details on its specific victims, sectors targeted, and leak site activity remain limited in public sources.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
BEAST LEAKS | Index |
⬇️ |
2025-08-20 |
http://beast6azu4f7fxjakiayhnssybibsgjnmy77a6duufqw5afjzfjhzuqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-15 |
http://ooie6tet7ggcmlgvtmyvok4s6vha6ecwczssbchbyxrg2r6v2m6zkkad.onion/ |
Screen |
Description
aka Belesn Group.
Belsen Group emerged in January 2025 as a data broker and leak-focused threat actor, not engaging in ransomware encryption. Their first major action involved publishing sensitive configuration files, VPN credentials, and IP addresses for over 15,000 Fortinet FortiGate firewalls—data likely stolen through exploitation of CVE‑2022‑40684. The group began by sharing the data freely to establish credibility, before shifting to monetized access and offering sales of network access to high-value targets such as major banks and an East African airline. Their activities place them firmly in initial access brokerage, targeting confidential infrastructure details for sale.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Belesn Group |
⬇️ |
2025-03-12 |
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/ |
Screen |
Description
BERT ransomware (also tracked as Water Pombero) first emerged in April 2025, rapidly targeting both Windows and Linux systems across Asia, Europe, and the U.S., with confirmed victims in healthcare, technology, electronics, and event services sectors. Its Windows variant employs a PowerShell-based loader that escalates privileges, disables Defender, UAC, and the firewall, then downloads the ransomware payload. The Linux version aggressively encrypts with up to 50 concurrent threads, forcibly shuts down VMware ESXi VMs to prevent recovery, and appends extensions like .encryptedbybert or .encrypted_by_bert. BERT uses AES encryption, and later variants feature optimized multithreading via ConcurrentQueue and DiskWorker threads. Analysts note code similarities with REvil and Babuk ESXi lockers, potentially pointing to shared development lineage or code reuse.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
BERT |
⬇️ |
2025-08-02 |
http://bertblogsoqmm4ow7nqyh5ik7etsmefdbf25stauecytvwy7tkgizhad.onion/ |
Screen |
|
⬇️ |
2025-07-01 |
http://wtwdv3ss4d637dka7iafl7737ucykei7pluzc7is3mgo2vl5nmq7eeid.onion/ |
Screen |
Description
BianLian ransomware first appeared in June 2022 as a Go-based crypto-locker but pivoted in January 2023 to a pure data-extortion model after security firms released free decryptors for early versions. In its initial phase, it used AES-256 + RSA-2048 hybrid encryption, appending the .bianlian extension to files and dropping ransom notes with Tor links. The group targets a broad set of industries—healthcare, education, government, critical manufacturing, and professional services—with confirmed victims in the U.S., U.K., Australia, and Canada. Initial access is often obtained via compromised RDP credentials, exploitation of vulnerabilities in internet-facing systems, or use of stolen VPN credentials from infostealers. Post-compromise, BianLian conducts network reconnaissance, credential harvesting, and exfiltration of sensitive files before issuing extortion threats on its leak site. The group has claimed responsibility for dozens of breaches, with ransom demands often in the $100k–$2 million USD range.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
BianLian | Home |
⬇️ |
2025-04-02 |
http://bianlianlbc5an4kgnay3opdemgcryg2kpfcbgczopmm3dnbz3uaunad.onion/ |
Screen |
BianLian | Home |
⬇️ |
2025-04-03 |
http://bianlivemqbawcco4cx4a672k2fip3guyxudzurfqvdszafam3ofqgqd.onion/ |
Screen |
|
⬇️ |
2025-02-10 |
http://bianliaoxoeriowgqohcly4a6sbkpc3se2yvxgidxomxlpuhx5ehrpad.onion |
Screen |
|
⬇️ |
Never |
http://bianlianvjr9vhy72f782342yvygfciusgfisgiygfs1bredw.i2p/ |
|
Description
BIDON is a variant of the Monti ransomware family, first observed around mid‑2023. It employs a double‑extortion strategy—encrypting victims’ files and simultaneously threatening to leak stolen data if the ransom isn’t paid. Notably, it appends the .PUUUK extension to encrypted files and drops a readme.txt ransom note outlining the extortion demands. The note offers a free decryption of two files as proof of capability and emphasizes that only authorized company personnel (e.g., top management) should engage. BIDON specifically targets corporate and enterprise organizations, not home users, and warns victims not to involve law enforcement or third-party recovery firms. It represents a shift toward more aggressive extortion tactics within the Monti lineage.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
BitRansomware (also known as DCryptSoft or ReadMe) surfaced in November 2020, primarily as a widespread cryptolocker targeting end users in the APAC region, especially universities in Japan and Hong Kong. The malware was delivered via a malspam campaign powered by the Phorpiex botnet, distributing deceptive ZIP attachments with a screensaver-like .scr payload. Once activated, BitRansomware encrypts files and appends the .ReadMe extension—leaving ransom notes to guide victims toward payment. The campaign peaked sharply around November 4, 2020, with over 28,000 email instances detected in a single day, as seen by VMware NSX telemetry.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://mrv44idagzu47oktcipn6tlll6nzapi6pk3u7ehsucl4hpxon45dl4yd.onion/ |
|
Description
Hellcome Bjorkanism
Bjorka emerged as a prominent data-extortion actor and hacktivist initially active in 2022, targeting Indonesian institutions with massive data leaks—including voter records, police data, and internal telecom and utility datasets. After going quiet in 2023, the actor resurfaced in early 2025, now positioning under the name Babuk2, leveraging legacy branding from the Babuk ransomware group to amplify perceived credibility and fuel data extortion operations. Notably, Bjorka has not been linked to deploying true ransomware payloads; rather, the strategy revolves around reputational leverage via data leaks and selecting branding for psychological impact.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Databases | Bjorka |
⬇️ |
2025-08-20 |
https://netleaks.net/databases/ |
Screen |
|
⬇️ |
Never |
http://wki2kiikvycnowcygyz7p4svefhgwcu57ae7brd5waitbsgoi6yrfvid.onion/ |
|
|
⬇️ |
Never |
http://3lce6cov7sj7vovrr3cbanqoolhgfgqqcvjrtlzlqnex7esdz33mdoqd.onion/ |
|
For Sale Page |
⬆️ |
2025-08-20 |
https://bjork.ai/ |
Screen |
Contact | Bjorka |
⬆️ |
2025-08-20 |
https://netleaks.net/contact/ |
Screen |
Bjorka |
⬆️ |
2025-08-20 |
https://netleaks.net/ |
Screen |
Description
BlackNevas ransomware — also referred to as “Trial Recovery” — was first observed in November 2024. It is a direct derivative of the Trigona ransomware family and continues the lineage's focus on extortion over public shaming. BlackNevas operators support a double-extortion model, encrypting files using AES-256 with RSA-4112-protected keys, and appending the .-encrypted or .ENCRYPTED file extension to affected files. Hybrid payloads are available for Windows, Linux, NAS, and VMware ESXi platforms.
While BlackNevas does not host its own data leak site, it reportedly collaborates with other ransomware groups for data publication — known partners include Kill Security, Hunters International, DragonForce, Blackout, Embargo Team, and Mad Liberator. The group has predominantly targeted large enterprises in sectors such as finance, telecommunications, manufacturing, healthcare, and legal. Initial access is commonly achieved via phishing or exploitation of vulnerabilities, with lateral movement facilitated through SMB enumeration and optional LAN-wide propagation.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Clist |
⬆️ |
2025-08-20 |
http://ctyfftrjgtwdjzlgqh4avbd35sqrs6tde4oyam2ufbjch6oqpqtkdtid.onion/ |
Screen |
Description
BlackSuit first appeared in May 2023 and is a confirmed rebrand or direct evolution of Royal Ransomware. It operates as a Ransomware-as-a-Service (RaaS), employing a double-extortion model—encrypting files and stealing sensitive data for leak threats. BlackSuit targets Windows and Linux systems, including VMware ESXi environments, using the .blacksuit extension for encrypted files. Technical analysis shows strong code overlaps (≈98%) with Royal, itself believed to be run by former Conti affiliates. Victims span healthcare, critical manufacturing, education, and government sectors, with notable incidents affecting public health systems in the U.S. Initial access vectors include phishing, exploitation of public-facing applications (e.g., Citrix and Fortinet vulnerabilities), and compromised credentials purchased from initial access brokers. Ransom notes direct victims to Tor-based negotiation portals.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
This Site Has Been Seized |
⬇️ |
2025-08-20 |
http://weg7sdx54bevnvulapqu6bpzwztryeflq3s23tegbmnhkbpqz637f2yd.onion |
Screen |
This Site Has Been Seized |
⬆️ |
2025-08-20 |
http://c7jpc6h2ccrdwmhofuij7kz6sr2fg2ndtbvvqy4fse23cf7m2e5hvqid.onion |
Screen |
403 Forbidden |
⬇️ |
2025-07-24 |
http://nz2ihtemh2zli2wc3bovzps55clanspsqx5htu2plolby45a7pk4d3qd.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-07-24 |
http://qjdremetxo2zpli32exwb5uct6cjljyj7v52d5thn7usmj5mlyxdojqd.onion/ |
Screen |
|
⬇️ |
Never |
http://yef4xoqj2jq554rqetf2ikmpdtewdlbnx5xrtjtjqaotvfw77ipb6pad.onion/ |
|
403 Forbidden |
⬇️ |
2025-07-24 |
http://ptsfbwx5j7kyk5r6n6uz4faic43jtb55sbls7py5wztwbxkyvsikguid.onion/ |
Screen |
|
⬇️ |
2024-10-16 |
http://ro4h37fieb6oyfrwoi5u5wpvaalnegsxzxnwzwzw43anxqmv6hjcsfyd.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-07-24 |
http://cyfafnmijhiqxxfhtofmn5lgk3w5ana6xzpc6gk5uvdfadqflvznpjyd.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-07-24 |
http://betrvom4agzebo27bt7o3hk35tvr7ppw3hrx5xx4ecvijwfsb4iufoyd.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-07-24 |
http://ybo3xr25btxs47nmwykoudoe23nyv6ftkcpjdo4gilfzww4djpurtgid.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-02 |
http://k6wtpxwq72gpeil5hqofae7yhbtxphbkyoe2g7rwmpx5sadc4sgsfvid.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-07-24 |
http://vm2rbvfkcqsx2xusltbxziwbsrunjegk6qeywf3bxpjlznq622s3iead.onion/ |
Screen |
|
⬇️ |
2025-05-09 |
http://ng2gzceugc2df6hp6s7wtg7hpupw37vqkvamaydhagv2qbrswdqlq6ad.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-02 |
http://2yxf2ald2c67twt4663piypum2fu6yt4su453naxsdiilpd4m7pgu6qd.onion |
Screen |
Index of / |
⬇️ |
2025-07-02 |
http://wjdnuogx3mrnnutshrx7nbvjuwqfxnrb32rifaozygwdvs325s75keqd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://wxqhwn52dnzbrtqeywg35jfvzbpwkw7edlxxoil7ag44plraezw5z5id.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://5bol522hpd3yknxfct2o35ilimxyo46licxxitjvajtvcedltfrj53qd.onion/ |
Screen |
|
⬇️ |
Never |
http://weg7sdx54bevnvuLapqu6bpzwztryeflq3s23trgbmnhkbpqz637f2yd.onion |
|
Description
BlackBasta emerged in April 2022 and is widely assessed to be operated by former Conti group members. It functions as a Ransomware-as-a-Service (RaaS), leveraging a double-extortion model—encrypting data and threatening public leaks on its Tor-based site. The malware supports Windows and Linux/VMware ESXi environments, using ChaCha20 for encryption with RSA-4096 for key protection. Encrypted files are appended with the .basta extension, and a ransom note (readme.txt) provides negotiation instructions. BlackBasta has hit victims across manufacturing, construction, healthcare, government, and critical infrastructure sectors, with confirmed targets in the U.S., Canada, U.K., Australia, and New Zealand. Initial access vectors include exploitation of known vulnerabilities (e.g., QakBot infections, ZeroLogon, PrintNightmare), phishing, and purchasing credentials from Initial Access Brokers. By mid-2024, BlackBasta was among the top five most active ransomware groups worldwide.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
403 Forbidden |
⬇️ |
2025-01-29 |
http://stniiomyjliimcgkvdszvgen3eaaoz55hreqqx6o77yvmpwt7gklffqd.onion/ |
Screen |
Chat Black Basta |
⬇️ |
2025-02-20 |
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion |
Screen |
403 Forbidden |
⬇️ |
2025-01-23 |
http://6y2qjrzzt4inluxzygdfxccym5qjy2ltyae7vnxtoyeotfg3ljwqtaid.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-01-29 |
http://r6qkk55wxvy2ziy47oyhptesucwdqqaip23uxregdgquq5oxxlpeecad.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-01-23 |
http://weqv4fxkacebqrjd3lmnss6lrmoxoyihtcc6kdc6mblbv62p5q6skgid.onion/ |
Screen |
thesiliconroad1.top |
⬇️ |
2025-08-13 |
http://thesiliconroad1.top/ |
Screen |
stuffstevenpeters4.top |
⬇️ |
2025-08-13 |
http://stuffstevenpeters4.top/ |
Screen |
greenmotors5.top |
⬇️ |
2025-08-13 |
http://greenmotors5.top/ |
Screen |
megatron3.top |
⬇️ |
2025-03-21 |
http://megatron3.top/ |
Screen |
403 Forbidden |
⬇️ |
2025-01-23 |
http://fmzipzpirdpfelbbvnfhoehqxbqg7s7efmgce6hpr5xdcmeazdmic2id.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-01-29 |
http://daulpxe3epdysjozaujz4sj7rytanp4suvdnebxkwdfcuzwxlslebvyd.onion/ |
Screen |
databasebb3.top |
⬇️ |
2025-08-13 |
http://databasebb3.top/ |
Screen |
403 Forbidden |
⬇️ |
2025-01-29 |
http://l6zxfn3u2s4bl4vt3nvpve6uibqn3he3tgwdpkeeplhwlfwy3ifbt5id.onion/ |
Screen |
|
⬇️ |
Never |
http://onlylegalstuff6.top/ |
|
|
⬇️ |
Never |
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/ |
|
|
⬇️ |
Never |
http://bpeln2aqs66qqfuex2cvcyjiy5ggcwbyh5nbmxzxt6daamkmpmufv4qd.onion/ |
|
|
⬇️ |
Never |
http://ond5arqab77n6tykvi4aqp7oqegqdfgqfyf7fzyhfyhmbp7iafpzdtad.onion/ |
|
Description
Black Berserk is a relatively unsophisticated ransomware strain analyzed in late 2023. It operates under a single‑extortion model—encrypting files and demanding payment, with no documented abilities or threats for data exfiltration or public leaks. In observed cases, the malware appends the .Black extension to encrypted files (e.g., 1.jpg.Black) and leaves a ransom note titled Black_Recover.txt, which urges victims to make contact to negotiate payment or test decryption with benign files. The infection method appears opportunistic, delivered via isolated incidents or broad malware distribution—not linked to targeted campaigns or infrastructure. There is no evidence of it functioning as a RaaS operation or targeting any specific victim profiles or sectors.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
BlackBit ransomware was first observed in August 2022 and is a .NET-based strain that closely mimics the design and functionality of LockBit 3.0, indicating either a fork of LockBit’s leaked builder or deliberate imitation. It uses a double-extortion model, encrypting victim files and threatening to leak stolen data via a Tor-based site. BlackBit employs AES symmetric encryption for file contents and RSA asymmetric encryption for key protection, appending the .BlackBit extension to affected files. The malware also includes features for terminating processes, deleting volume shadow copies, and disabling recovery mechanisms. Initial access vectors are not comprehensively documented but are consistent with phishing, exploitation of vulnerable public-facing services, and the use of compromised credentials. Victims have been identified across various sectors, including technology, manufacturing, and professional services, though its activity level has been far lower than LockBit’s.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://blackbittk6ux3mtrbh2qjpmrkygdmh3uqafj5h2dg2bt63jzh5xf3iad.onion |
|
Description
BlackByte ransomware was first observed in July 2021 and operates as a Ransomware-as-a-Service (RaaS). It uses a double-extortion model—encrypting victim files while exfiltrating sensitive data for publication on its Tor-based leak site. The ransomware is written in C# and uses AES-256 for file encryption, with keys protected by RSA public-key encryption. Early variants exploited the ProxyShell vulnerability in Microsoft Exchange servers for initial access, but later campaigns have leveraged phishing, malicious attachments, and vulnerable internet-facing systems. BlackByte appends extensions such as .blackbyte or .blackbyte2.0 to encrypted files and leaves ransom notes (BlackByte_restoremyfiles.txt) instructing victims to contact them via Tor. The group has targeted organizations worldwide, including critical infrastructure, manufacturing, and government sectors. In February 2022, the FBI and USSS released a joint advisory warning about BlackByte’s impact and offering detection signatures.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://6iaj3efye3q62xjgfxyegrufhewxew7yt4scxjd45tlfafyja6q4ctqd.onion |
|
BlackByte BLOG |
⬇️ |
2021-12-30 |
http://f5uzduboq4fa2xkjloprmctk7ve3dm46ff7aniis66cbekakvksxgeqd.onion |
|
|
⬇️ |
2021-05-01 |
http://dlyo7r3n4qy5fzv4645nddjwarj7wjdd6wzckomcyc7akskkxp4glcad.onion |
|
BlackByte BLOG |
⬇️ |
2022-04-24 |
http://fl3xpz5bmgzxy4fmebhgsbycgnz24uosp3u4g33oiln627qq3gyw37ad.onion |
|
BB Auction |
⬇️ |
2023-10-21 |
http://jbeg2dct2zhku6c2vwnpxtm2psnjo2xnqvvpoiiwr5hxnc6wrp3uhnad.onion/ |
Screen |
BB Auction |
⬇️ |
2025-05-17 |
http://53d5skw4ypzku4bfq2tk2mr3xh5yqrzss25sooiubmjz67lb3gdivcad.onion/ |
Screen |
|
⬇️ |
Never |
http://a2dbso6dijaqsmut36r6y4nps4cwivmfog5bpzf6uojovce6f3gl36id.onion:81 |
|
|
⬇️ |
Never |
http://vzzf6yg67cffqndnwg56e4psw45rup45f2mis7bwblg5fs7e5voagsqd.onion:81 |
|
|
⬇️ |
Never |
http://inbukcc4xk67uzbgkzufdqq3q3ikhwtebqxza5zlfbtzwm2g6usxidqd.onion:81 |
|
|
⬇️ |
Never |
http://p5quu5ujzzswxv4nxyuhgg3fjj2vy2a3zmtcowalkip2temdfadanlyd.onion/ |
|
File downloader |
⬇️ |
2024-12-13 |
http://tj3ty2q5jm5au3bmd2embtjscd3qjt7nfio2o7cr6moyy5kgil5pieqd.onion |
Screen |
|
⬇️ |
Never |
http://kpfj3bmo77bwpy2f5zzwj4knatueuv7t3ldlpp4tlrmv2buiziw2tdyd.onion |
|
|
⬇️ |
Never |
http://ce6roic2ykdjunyzazsxmjpz5wsar4pflpoqzntyww5c2eskcp7dq4yd.onion/ |
|
Description
Crux is a newly identified ransomware variant active since July 2025, which claims affiliation with the established BlackByte ransomware group. It implements a double‑extortion model—encrypting files (with the .crux extension) and threatening data leak via a Tor-based portal. A distinctive feature of Crux is its execution flow: it initiates via svchost.exe, cmd.exe, and bcdedit.exe to disable Windows recovery, followed by rapid file encryption. The ransomware has been confirmed in at least three incidents across sectors including agriculture, education, professional services, media, and nonprofits, in both the U.S. and U.K. Ransom notes consistently follow the naming pattern crux_readme_[random].txt.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
BB Auction |
⬆️ |
2025-08-20 |
http://dounczge5jhw4iztnnpzp54kd4ot3tikhjsimurtcewqssgye6vvrhqd.onion/ |
Screen |
File downloader |
⬆️ |
2025-08-20 |
http://faow6n2hkweyyalp67zvonafn2dzphw36cav653wamj724mwsmtfa5yd.onion/ |
Screen |
Description
Black Hunt ransomware has been active since at least mid-2021 and operates under a double-extortion model, encrypting victim files and threatening public release of stolen data via a Tor-based leak site. It primarily targets organizations rather than individuals, with confirmed attacks in sectors including manufacturing, retail, technology, and local government. Encrypted files are appended with the .BlackHunt extension, and ransom notes (Restore_Data.txt) direct victims to Tor portals for negotiation. The ransomware is capable of terminating processes, deleting shadow copies, and disabling recovery functions to maximize impact. Initial access methods include exploitation of vulnerable RDP services and the use of compromised credentials from initial access brokers. While its activity level is smaller compared to major RaaS families, its leak site has featured victims from multiple countries, suggesting an international reach.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion |
Screen |
Description
BlackMatter emerged in July 2021 and quickly positioned itself as the successor to DarkSide (responsible for the Colonial Pipeline attack). It operated as a Ransomware-as-a-Service (RaaS), adopting a double-extortion model—encrypting systems while exfiltrating sensitive data for publication on its leak site. BlackMatter targeted Windows and Linux/VMware ESXi systems, using ChaCha20 for file encryption with RSA-1024 public key protection. The malware appended a custom extension per victim and dropped ransom notes (README.txt) with Tor portal links. The group focused on large organizations in industries such as critical infrastructure, agriculture, technology, and manufacturing, but claimed to avoid hospitals, nonprofits, and government entities (though some reports contradict this). Initial access methods included exploitation of known vulnerabilities, stolen credentials from brokers, and phishing campaigns. BlackMatter ceased operations in November 2021 after reported pressure from law enforcement and possible member arrests.
Links
Page title |
Available |
Last visit |
URL |
Screen |
BlackMatter |
⬇️ |
2021-11-04 |
http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/ |
|
|
⬇️ |
Never |
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/ |
|
|
⬇️ |
Never |
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion |
|
Description
Blackout surfaced in February 2024 and operates using a double-extortion model. Targets span sectors like healthcare, mining, telecommunications, and food & beverage—in countries including France, Canada, Mexico, Croatia, and Spain. This ransomware employs conventional cryptographic techniques (details unspecified), appends a custom extension to encrypted files, and presents victims with ransom demands via a Tor-based leak/negotiation site. The operation runs as a crypto-ransomware and data broker, combining extortion with data publication threats.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Blackout Blog |
⬇️ |
2025-08-19 |
http://black3gnkizshuynieigw6ejgpblb53mpasftzd6pydqpmq2vn2xf6yd.onion |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://4qyjonpyksc52bc3fsgfgedssqgo4a6vlfsjknqnkncbyl4layqkqjid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ao5oo2luy6avdfomyw7hcegmfl4let2g5bzjqjzch6b5rpdshmuvccad.onion |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://urey23jtg6z7xx3tiybmc4sgcim7dawiz2abl6crpup2lfobf7yb5wyd.onion |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://mu6se7h7qfwuqclr4cc6zy7qevod6gyk37aq5vwnayrtbx3qqycx2fyd.onion |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://eleav2eq3ioyiuevbyvqaz3vruwvpislphszo4cm7n56itbpnupxngyd.onion |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://2cyxmof76rxeqze5snxxooqmhzjtcploqswxoxmenfayphumdhrtrzqd.onion |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://rqqn25k3hgmfkh7ykjbmakjgidwweomr7cbpy6pfecpxs57r5iwzwtyd.onion |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://idep6vd7ywl7uruhsutqjdnjawe33hct35523rrmf73kb46xrhfb5sid.onion/ |
Screen |
Description
BlackShadow is a state-aligned cybercrime group reportedly linked to Iran’s cyber operations, first identified in late 2020. Their operations blend data exfiltration with ransom threats, notably targeting Israeli organizations such as Cyberserve—a web hosting provider—and leaking data to inflict reputational damage. Victims included entities like Atraf (an LGBTQ dating app), tour booking services, and museums, reflecting political or ideological motivations over financial gain. Despite carrying out extortion, there is no evidence that BlackShadow employs typical encryption-based ransomware mechanics; instead, they leverage stolen data and the threat of public exposure.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://544corkfh5hwhtn4.onion |
|
Hentai Heroes |
⬇️ |
2022-08-07 |
http://blackshadow.cc |
Screen |
Description
BlackSnake is a Ransomware-as-a-Service (RaaS) operation that first appeared in August 2022, when its operators began recruiting affiliates on underground forums with an unusually low revenue share of 15%. It primarily targets home users rather than large enterprises and does not maintain a public leak site. Built on the Chaos ransomware code base, it features both file encryption and a cryptocurrency clipper module to steal funds from victims. The ransomware is developed in .NET and includes safeguards to avoid execution in Turkish or Azerbaijani environments, suggesting geographic targeting preferences. Infections result in encrypted files and ransom notes instructing victims to make contact via email for payment negotiations. The group’s operational scale and visibility remain limited compared to major RaaS families.
Links
Page title |
Available |
Last visit |
URL |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Bl@ckt0r | Bug Hunter and Data Breacher Group |
⬇️ |
2023-10-21 |
http://bl%40ckt0r:bl%40ckt0r@bl4cktorpms2gybrcyt52aakcxt6yn37byb65uama5cimhifcscnqkid.onion/0x00/data-breach.html |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Bluebox |
⬇️ |
2024-12-25 |
http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/ |
Screen |
Description
BlueSky ransomware first emerged in July 2022 and is characterized by aggressive, high-speed file encryption using a multithreaded architecture. Written with code elements reminiscent of Conti v3, it encrypts files using ChaCha20 secured with RSA‑4096, and further employs Curve25519 for key agreement. Delivery commonly comes through trojanized downloads from risky websites (e.g., “crack” or “keygen” hosts) or phishing emails. The malware also spreads laterally via SMB and evades detection by hiding threads using NtSetInformationThread. Once deployed, it renames encrypted files with the .bluesky extension and drops ransom notes in both HTML and TXT formats. Unlike double-extortion threats, BlueSky does not operate a public leak site and appears focused solely on disrupting file access. Observed activity spans large enterprises to SMBs, but the volume of attacks remained relatively low through early 2023.
Links
Page title |
Available |
Last visit |
URL |
Screen |
BlueSky DECRYPTOR |
⬇️ |
2023-10-17 |
http://ccpyeuptrlatb2piua4ukhnhi7lrxgerrcrj4p2b5uhbzqm2xgdjaqid.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://myosbja7hixkkjqihsjh6yvmqplz62gr3r4isctjjtu2vm5jg6hsv2ad.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
502 Bad Gateway |
⬇️ |
2021-12-28 |
http://bonacifryrxr4siz6ptvokuihdzmjzpveruklxumflz5thmkgauty2qd.onion |
|
Description
aka BaqiyatLock
BQTLock surfaced in July 2025 and operates as a fully-fledged Ransomware-as-a-Service (RaaS) with a double-extortion model. It employs AES-256 for file encryption, with keys secured by RSA-4096, appending the .BQTLOCK extension to encrypted files. Victims receive ransom notes such as READ_ME-NOW_*.txt, warning that failure to make contact within 48 hours doubles the ransom, and that decryption keys will be destroyed after seven days. The group offers tiered pricing "waves" with different XMR (Monero) amounts for quicker decryption—e.g., Wave 1 might cost 13 XMR, while Wave 3 could be 40 XMR. Targets include organizations such as U.S. military alumni networks and educational institutions.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
BQTlock :: RaaS & Decryption Portal |
⬇️ |
2025-08-13 |
http://yywhylvqeqynzik6ibocb53o2nat7lmzn5ynjpar3stndzcgmy6dkgid.onion/ |
Screen |
Description
Br0k3r is not a conventional ransomware gang, but rather an Iran-linked cyber espionage and access brokerage group leveraging its foothold within victim networks to facilitate ransomware operations. Active since around 2017, the group provides privileged domain access—often sold or shared directly—with known ransomware operators such as ALPHV/BlackCat, NoEscape, and RansomHouse, receiving a portion of each successful ransom payout. Victims have included U.S. schools, municipal governments, financial and healthcare organizations, as well as targets in Israel, Azerbaijan, and the UAE. Br0k3r’s strategy merges espionage with criminal collaboration, allowing them to support both state-aligned intelligence objectives and financial incentives.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://brok3r7bhcblynwpoymgarr6zwcy4ttfbhkhcmotz4lw2gcsuojgaeqd.onion/ |
|
Description
Brain Cipher ransomware surfaced in mid-2024, rapidly gaining notoriety after a high-impact attack on Indonesia’s National Data Center, which disrupted over 160 government services including immigration systems. The group operates with a double-extortion model, encrypting data using a LockBit 3.0-based payload (Salsa20/RSA hybrid) and threatening leaks via a Tor-hosted portal. Distinct behaviors include encrypting both file contents and filenames, and customizing encrypted file names with appended random extensions. Initial access methods include phishing and purchases from initial-access brokers. Ransom demands have ranged from tens of thousands up to $8 million USD, though victims have sometimes been offered decryption keys without payment. Victims span sectors such as government, healthcare, education, media, and manufacturing across Southeast Asia, Europe, and the Americas.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Brain Cipher Client Area |
⬇️ |
2024-07-07 |
http://mybmtbgd7aprdnw2ekxht5qap5daam2wch25coqerrq2zdioanob34ad.onion/ |
Screen |
Brain Cipher Leaks |
⬆️ |
2025-08-20 |
http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/ |
Screen |
|
⬇️ |
Never |
http://cuuhrxbg52c5agytmtjpwfu7mrs4xtaitc4mukkiy2kqdxeqbcmuhaid.onion/ |
|
BrainCipher Client Area |
⬇️ |
2025-02-25 |
http://p6wmotxzvg34tdmpwm4beqgrcyp5iys43snkccsahnw74la3k3xx6pad.onion |
Screen |
BrainCipher Client Area |
⬆️ |
2025-08-20 |
http://brain4zoadgr6clxecixffvxjsw43cflyprnpfeak72nfh664kqqriyd.onion/ |
Screen |
Brain Cipher FileSharing |
⬆️ |
2025-08-20 |
http://4ldgw2wuidqu5ef3rzx4byonf3y7rdnh43jiw2z4sbtjiwic6gkov7yd.onion/c/lgc2Yxua65agt4XMOMkQKJjsdrV2IzYk |
Screen |
Not Found |
⬆️ |
2025-08-20 |
http://4ldgw2wuidqu5ef3rzx4byonf3y7rdnh43jiw2z4sbtjiwic6gkov7yd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://zktnif5vckhmz5tyrukp5bamatbfhkxjnb23rspsanyzywcrx3bvtqad.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://yt7beb7fj6xbh4dndrlyvl3gn4ck36qn2oqheiqjs4bp3wspj3wgpcad.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://i6b4r6blgmm3r62zj42qxn6bvcbcrslcg6b6uwqws6xhnxz2howbhkid.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://pzghjpkm2liszmvjsttflp475zqxgrywjhr7xagc4bqfb2a7aw3qysyd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://5v6tgs5xyuvl7kpg5b26e54kddlxdvktep2qmglawrohksv3qjwvw7qd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://lhdv4ydjx5idzvntdrmcbwsh3dhdi3ww5hoz3ws2d5q5jlfewdacx4qd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://oe7kcuvnulmdzir6zkewv5p353kc7qjf5tyqxfxabhzsm26pji44elqd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://zv27q4tjvqxelm2imgztfg7gtl3v56oqabe77hiufqoqilis2dgcdsad.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://ubetdhmgnry4jk7ya7gh7p4hm4c3c57srkw62oc6hjmvvvkrqeybjjid.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://ixvarmokkir6t6fzpn7prussp3ulys66aeivrhcvrmfowqi2gi2fgryd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://tahr6kwobsi7fj5j3hoyzxr34ipyiyuv2svhteht5td4etq23bcx7tyd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://ncyg34lipi3w2u7yvxl3swr6wj6lsoeix3grrdsn6nmcv4r7vntanoid.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://bgpeqy3d5svuikeaueitix6zosg3pzekw77viulnucsiqsn4sjr65iyd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://as7fbsjvifse52ek5qnptfgvkduvvnl56adb3jjgk6k3p7bisipvotyd.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://xangddavm54rgsju7iceahxztbqrcflzunffwbaswwhhftieygc4j3ad.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://q226mkoikzgyu33jin7ox3qo6tea7yhlgz52p5lslpj73edtocsz4wqd.onion/ |
Screen |
BrainCipher Storage |
⬇️ |
2025-08-20 |
http://hdgfvxxkepllbvqvk7vrudgwq55tg4joo4xpajaa3nv5gzpake66bnid.onion/ |
Screen |
BrainCipher Storage |
⬆️ |
2025-08-20 |
http://jgkgqztfmwk53wlttsjo6i3nmwtzoch2oi2bocqzb4zmp6kfspuiaead.onion/ |
Screen |
BrainCipher Client Area |
⬆️ |
2025-08-20 |
http://braincgksuixxkpkme7zlpkh7u47oryxx574d74ws4eal4t2mxyahbqd.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Home | BytesFromHeaven |
⬇️ |
2025-08-12 |
http://jhjqe4vmwfpmjgrminvt7hx7jmcmw2lw45emqmdqyjkvux2eh5lujnyd.onion |
Screen |
Description
Cerber ransomware, active since 2016, has resurfaced occasionally using the name C3RB3R. It operates as a semi-private Ransomware-as-a-Service (RaaS) and targets both Windows and Linux environments. Cerber typically uses AES + RSA cryptographic methods and appends the .L0CK3D extension to encrypted files. It executes operations via phishing, malicious macros, and has even leveraged vulnerabilities such as Atlassian Confluence’s CVE-2023-22518 for deployment. Victims are directed to Tor-hosted payment portals for decryption instructions.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2024-10-01 |
http://j3qxmk6g5sk3zw62i2yhjnwmhm55rfz47fdyfkhaithlpelfjdokdxad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://c3rb3rnow2alp26exjwlrs7puvftcxqywmpqedlierashbqikyxgg3qd.onion |
Screen |
Description
Cactus ransomware surfaced in March 2023 and has quickly become one of the fastest-growing and most aggressive ransomware-as-a-service (RaaS) variants. It follows a double-extortion model, encrypting files and threatening to leak stolen data to pressure victims. Cactus is notable for its ability to encrypt its own executable, evading detection by anti-malware tools, and for exploiting vulnerabilities in VPN appliances (e.g., Qlik Sense, Fortinet VPN) to gain initial access. Targets span global enterprises—including Schneider Electric and the Housing Authority of Los Angeles—and the group appears highly adaptable, often deploying the BackConnect persistence tool commonly associated with Black Basta. The ransomware changes file extensions to variants like .cts0 or .cts1, and places a ransom note named cAcTuS.readme.txt.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
500: Internal Server Error |
⬇️ |
2025-04-07 |
https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion |
Screen |
|
⬇️ |
2025-04-08 |
https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/ |
Screen |
|
⬇️ |
2025-04-28 |
https://vhfd5qagh6j7qbisjqvly7eejqbv6z5bv77v6yuhctn77wmd3hjkyvad.onion |
Screen |
|
⬇️ |
2025-04-28 |
https://acfckf3l6l7v2tsnedfx222a4og63zt6dmvheqbvsd72hkhaqadrrsad.onion |
Screen |
|
⬇️ |
2025-04-08 |
https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion |
Screen |
|
⬇️ |
2025-04-21 |
https://truysrv2txxvobngtlssbgqs3e3ekd53zl6zoxbotajyvmslp5rdxgid.onion |
Screen |
|
⬇️ |
2025-04-16 |
https://jvtxo5gdcgloguty322ynfnpqkc2whe2jauc7ucm7bzmgct3k7ogr4yd.onion/ |
Screen |
Description
CatB ransomware was first observed in late 2022, gaining attention for abusing DLL hijacking via the Microsoft Distributed Transaction Coordinator (MSDTC) service—loading a malicious payload through DLL sideloading methods. The malware arrives in a two-stage dropper: the first DLL unpacks and launches the main payload (commonly named oci.dll), which subsequently encrypts files using hybrid RSA/AES cryptography. Unlike conventional ransomware, CatB does not rename files or distribute typical ransom notes; instead, it prepends the ransom message directly to the start of each encrypted file, making detection more difficult. Victims are instructed to contact the attackers via email (e.g., catB9991@protonmail.com or fishA001@protonmail.com), with the ransom demand escalating daily. Initial analysis suggests CatB may be a rebrand or evolution of Pandora ransomware, sharing various code artifacts and operational behavior.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Cerber Imposer is a post-2019 rebrand of the Cerber ransomware family, resurfacing in late 2021 with updated targeting of enterprise environments. Unlike its classic counterpart, Cerber Imposer utilizes the .locked file extension and includes a unique recovery note named __$$RECOVERY_README$$__.html. It does not reuse the original Cerber codebase; instead it borrows branding while operating under new cryptographic implementations and deployment tactics. Threat actors have leveraged known remote code execution vulnerabilities in Atlassian Confluence (CVE-2021-26084) and GitLab (CVE-2021-22205) to deliver this ransomware. The rebranded variant has compromised servers in the U.S., Germany, China, and Russia, indicating a broader scope of targeting than originally seen with early Cerber campaigns.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
CerBerSysLock first appeared in December 2017 as a cryptoransomware imposter, leveraging Cerber-style branding to deceive victims. It uses XOR-based encryption to lock files and appends extensions such as .CerBerSysLocked0009881. Victims receive a ransom note titled “HOW TO DECRYPT FILES.txt”, which falsely claims to be from the Cerber ransomware. The note includes an email contact—TerraBytefiles@scryptmail.com—and instructs victims to reference their ID (e.g., "CerBerSysLocked0009881") when communicating. The ransomware is technically linked to the Xorist family and is generally considered an opportunistic, low-profile scam rather than part of a broader Ransomware-as-a-Service (RaaS) operation.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Chaos is a rapidly evolving Ransomware-as-a-Service (RaaS) group first observed in early 2025. It is considered distinct and unaffiliated with the Chaos Ransomware Builder that originated around 2021. Known for highly aggressive double-extortion operations, Chaos targets organizations across multiple platforms—Windows, ESXi, Linux, and NAS—with fast, configurable encryption mechanisms and optional partial-file targeting for stealth. Attackers gain access through vulnerabilities, phishing, or brokered credentials, then encrypt files while threatening to leak or destroy stolen data. Notable incidents include the breach of Optima Tax Relief, in which the group exfiltrated 69 GB of sensitive data before encrypting systems.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
CHAOS |
⬆️ |
2025-08-20 |
http://hptqq2o2qjva7lcaaq67w36jihzivkaitkexorauw7b2yul2z6zozpqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-02 |
http://httj32vkww42kq3kjbsbuuv2izalkvswuyf5hepdodakrjq42ploe6ad.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-02 |
http://2yxf2ald2c67twt4663piypum2fu6yt4su453naxsdiilpd4m7pgu6qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-06-09 |
http://k6wtpxwq72gpeil5hqofae7yhbtxphbkyoe2g7rwmpx5sadc4sgsfvid.onion/ |
Screen |
Index of /goosehead/ |
⬆️ |
2025-08-20 |
http://qf4p6ul3g7wyvynkxawlu7ganvgbk44myl35jqfa3aroass33dbvmdyd.onion/goosehead |
Screen |
CHAOS |
⬆️ |
2025-08-20 |
http://cdgi6zjox6zr5epk7k5rg673qduxy7dlkk7ws3n4vusspr5bmhx24aqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-02 |
http://bna6mhximutqknymisjbp277swmhf7gocambh6y62qmdtup34unjs7yd.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-02 |
http://een55qvybeygshxbblvfevk6uzcs6lhpj6num7ymbpw7z6cehozszlad.onion/ |
Screen |
Description
Cheers is a Linux-based ransomware variant observed starting in May 2022, engineered specifically to target VMware ESXi servers. The malware was developed from leaked Babuk ransomware source code and leverages the SOSEMANUK stream cipher combined with ECDH key exchange for encryption. It terminates all running virtual machines before renaming and encrypting log files and VM-related extensions—like .vmdk, .vmsn, and .vswp—appending a .Cheers extension. A ransom note titled "How To Restore Your Files.txt" is dropped per directory. The ransomware is attributed to the Chinese-affiliated group BRONZE STARLIGHT (also known as Emperor Dragonfly, DEV-0401), which has previously deployed other strains like Rook, NightSky, and Pandora. Cheers targets a range of industry sectors, with confirmed victims across healthcare, finance, logistics, and manufacturing.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Cheers! |
⬇️ |
2022-09-20 |
http://rwiajgajdr4kzlnrj5zwebbukpcbrjhupjmk6gufxv6tg7myx34iocad.onion/ |
Screen |
|
⬇️ |
Never |
http://crkfkmrh4qzbddfrl2axnkvjp5tgwx73d7lq4oycsfxc7pfgbfhtfiid.onion/ |
|
Description
ChileLocker first emerged in August 2022 and is considered part of the broader ARCrypter ransomware family. It employs a double-extortion model, encrypting Windows and Linux/VMware ESXi systems and threatening data leaks. ChileLocker uses the NTRU public key cryptosystem for encryption and typically appends the .crypt extension to affected files. Following encryption, it drops a ransom note—often named readme_for_unlock.txt—and directs victims to a password-protected Tor negotiation portal, with the password provided in the note. The group also disables recovery mechanisms by deleting shadow copies. Its initial access tactics include exploitation of misconfigured RDP access, phishing, malicious installers, botnets, fake updates, and malvertising. The ransomware has impacted victims across various regions, including Chile, Mexico, Canada, Spain, and others.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://z6vidveub2ypo3d3x7omsmcxqwxkkmvn5y3paoufyd2tt4bfbkg33kid.onion |
|
|
⬇️ |
Never |
http://ebljej7okwfnx5hdfikqqt2uqehihqv3yns3ziij5clqpklwb3i2cxad.onion/ |
|
|
⬇️ |
Never |
http://7wa2bi6grhbu4opt5bguga4g63jsxiy3ysfbabh7dbyk3niqxlsburad.onion/ |
|
Description
Chort is a relatively new data-extortion ransomware group that surfaced in late 2024, with confirmed activity beginning in October–November 2024. It operates under a double-extortion model—exfiltrating sensitive data before encrypting systems—and organizes victims via a Tor-hosted data leak site (DLS). The group has targeted organizations in the U.S. education sector (including schools and nonprofits) and in Kuwait's agriculture sector, among others. Technical behaviors include execution via PowerShell and removal of shadow copies to disrupt recovery. The group's approach emphasizes public pressure through data exposure rather than technical innovation.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Captcha |
⬇️ |
2024-12-27 |
http://hgxyonufefcglpekxma55fttev3lcfucrf7jvep2c3j6447cjroadead.onion |
Screen |
Description
Cicada3301 is a sophisticated Ransomware-as-a-Service (RaaS) group that emerged in June 2024. It’s written in Rust and supports cross-platform operations, targeting Windows, Linux, VMware ESXi, NAS, and even PowerPC systems. Technically, its ransomware shares many traits with BlackCat/ALPHV, such as use of ChaCha20 encryption, Rust-based structure, similar configuration interfaces, and methods for shutting down virtual machines and deleting snapshots. Cicada3301 also implements double-extortion tactics—encrypting or exfiltrating data and publishing it on Tor-based leak sites. The group appears to have established an affiliate program, demonstrated through their deployment interfaces and recruitment tactics via forums like RAMP. Operations are believed to be highly professional, possibly involving former ALPHV developers or affiliates.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Cicada3301 |
⬆️ |
2025-08-20 |
http://cicadabv7vicyvgz5khl7v2x5yygcgow7ryy6yppwmxii4eoobdaztqd.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-01-03 |
http://cicadaxousmk6nbntd3ucxefmfgt2drhtfdvh7gmdeh3ttvudam6f2ad.onion |
Screen |
Cicada3301 |
⬆️ |
2025-08-20 |
http://cicadafhqpjwm2sblkfbuwn7sglbibuejr3m7fildpqpjv3hghlhb4id.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://zf6bl4dczp5z7uaba2lhm5wrhrpflwvzsx2nhf7zyf63tpsfzc54tbad.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://hgannromwuui7n2jvphpteposc3gioqkuo2ncb6fzopasgcq7ixcjeqd.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://osd6tsgegts2xaqo3o2hrpqatwlslqfyc3msvyksad4iucauif3oqqad.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://uds75egfqi7mfpxckf2un742qsj6rh3kfrydqaldwgkrqp2a37lk6fyd.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://wuyfbttjjzsmr5ghl5hoi75ytse3bwrqgk63c6guv3lhw7hwtxbgveid.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://bmfyfxl74qb6rsukgwymv7e22ua4uvhszsamqwx7jmj57qkamxwlhbid.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://yaoehn32c2s5pwsuzhaa4lsu2a4seycpwyvn5gfz3bn4i74t2jo3frad.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-05-09 |
http://5atqn4dwosjauijzj445mm7t6bqrcvzlzcylpmpnx243jxvlimyb6aid.onion/ |
Screen |
Cicada3301 |
⬇️ |
2025-08-20 |
http://ruzislhpcuvfzw3t2xfqu7gog3gs5j2u65ysaq3ybqkzri3hjddaqgad.onion/ |
Screen |
|
⬇️ |
Never |
http://leakshrlgof456tiw4ww5moiqlnrcork7q7r3cjgmsvex6zazpluhlad.onion/ec49pw6bi8xc2mk3j89kkiaa4ikdrf4wnq2nas4cseciagbw5pq63th7cqajky3c/ |
|
|
⬆️ |
2025-08-20 |
http://cicadapkh4vg2qh4qcoelszhftota5cdcgrwbjcesdyiwjwmsfzgobid.onion |
Screen |
Description
CiphBit is a crypto-ransomware first detected in April 2023. It utilizes a double-extortion model, encrypting files and threatening to leak stolen data via a Tor-hosted portal if ransom demands are not met. The malware appends encrypted files with a vector including a unique victim ID, the attacker’s email address (onionmail.org), and a four-character random extension—making file identification and recovery especially difficult. Victims span various sectors including banking, manufacturing, healthcare, logistics, and professional services across North America and Europe. The group is classified as a data broker due to its evolving extortion methods involving free leaks and selective leaks to pressure victims. Recent high-profile victims include iptelecom GmbH (Germany) and Therma Seal Insulation Systems (USA), reaffirming its cross-industry reach and impact.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
CiphBit Data Leak |
⬆️ |
2025-08-20 |
http://ciphbitqyg26jor7eeo6xieyq7reouctefrompp6ogvhqjba7uo4xdid.onion/ |
Screen |
Sonar - Encrypted communications |
⬆️ |
2025-08-20 |
http://sonarmsng5vzwqezlvtu2iiwwdn3dxkhotftikhowpfjuzg7p3ca5eid.onion/contact/CiphBit |
Screen |
|
⬇️ |
Never |
http://ciphbitekvxj27jmtw5sncirfrhxrh4cw4a5qw7ef6o4vqfy4habxbyd.onion |
|
Description
Cloak is a cybercriminal ransomware group that first appeared publicly in mid-2023, operating with a double-extortion model. It deploys an ARCrypter variant derived from Babuk, delivered via loaders that terminate security and backup services, delete shadow copies, and install encrypted payloads using algorithms like HC-128 combined with Curve25519 key generation. Victims include entities such as the Virginia Attorney General’s Office, whose IT systems were disrupted and whose data (134 GB) was exfiltrated and listed on Cloak’s Tor leak site. Cloak has been linked to other ARCrypter variants like Good Day, sharing victim portals and infrastructure. Its operations reportedly use initial access brokers, phishing, malvertising, and exploit kits for network infiltration.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http://cloak7jpvcb73rtx2ff7kaw2kholu7bdiivxpzbhlny4ybz75dpxckqd.onion |
Screen |
|
⬇️ |
Never |
http://6mw4yczxeqoiq7rgwnpi75qxsjd5jykuutpatflybodwlckoarhfdlid.onion/ |
|
|
⬇️ |
2024-12-18 |
http://7puvv4qtcrigzbxshqibkpibzbmrs6thb7s6uf3tisqfp3t2ddpp66id.onion/ |
|
|
⬇️ |
Never |
http://jpef6snenchj3rxgugsozky3i34q66vmcoqy7neyu37xxiwxrad5doid.onion |
|
403 Forbidden |
⬆️ |
2025-08-20 |
http://glrw7ip5gz2fv2njbiqfvg5uiwavllw5zuixko4yrpj5hta7fjwqpjqd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://vicjwr6abknvcfjomocyb3koloidahc3hidwt5sq2ytwk7yepwfzlsid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://puzhh5aykks65qneqantprbqjt6k5bnigmwqwv6yvkxvkfu4ivva5mid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://piatupks5hai3oafo66xlj2eg2fbzjqy2j7gy3nyhqmnthlrwvrsolad.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://necnstpnzuaovjocmiuv7ned7bstczit3kkvotqxl53xo5rfohndlvid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://ey2eak3vq5zbeu4s56m25mm4kvszy2is7gyjs6tsfzmhptbyijkzn2yd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://b53cqorlo7uftd3ymxguwnn7rfoz54ryoojjqxowdsaw2bahvuppntyd.onion |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http://l3bbtg2p2gp2x43e2nngzkf7ab52k4mef3saowrl6m5notkts7p2vfyd.onion |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http://vsdp5gqwrunytxw4f6dbxznux66aaewlwyenw3rantba4lwyzbckgfid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://a6gq22ngckken4xksz5ytl66sqeylh45ktke5pnbzfdksw5sfum5lvqd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://nbfxtlikrnicuht5yvvhlujpnh3spzjmek6eujeyck2ws34yytxjdhyd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://ziburuf5kh4phq5i6nmukpke7uruflhlvfexfmjwiwgghapz6ug3ajyd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://am3mzzguimx45wxywpukvwf3gobt3r4bidxzntjpsmqqge4s3vi2vvid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://occwme3xtlnzk3nlhn5ewsgodswrp6pysmmk7kcxqgj4hyiwkhoqcuyd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://qyywpuxysuur4exynwwwhu6nbd2f5vpj3h4tjbltfhwd4blamd4fppqd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://hsn2e745m36crxj2gmnrp432vbsyarhwvq3fgcyus345dp3oqlrltuad.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://pbbeck4xcy3jzbu6lv5db3c5n3n44wngmpb5jj3yo4px32mlznziwbid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://hmxt5u75kj5qxqjqhckgaoda6zndgxcazleersyioat4iuq3ldgmkcid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://cii64fki62v2mudocjvgarzlmnpqrfp6xb7korapmdd7qmjpnccgduyd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://jrmayo7rvsx6sbv36djpdge6iwuem67dhccpctera2ykmqr6kplhayad.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://ljrswxeei4isir3s5i7xmlzpx6sabmkgd7mvjrimcqwu7rqpn7bdjfad.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://qixf7fqw237ikunw4ey22jsc4deltducf6zn4mq4ldyqab3ij3gehlyd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://ztqugnw4upfmd6mu3l6sdz2mfvzxzouhwgqqowyjeedgsmz733dqq2ad.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://u66kitj46wmr5onijbbkg7cq45crcs66c563kyqy6klxm5c2nz42ujid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://e7gxrudyx2o733zlernyqqv623wyky5teor5xhnnx2g6dt4vf6jwn2yd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://qx2b2on5phkj4jczfpzfkb5cuhxn7wfqbgdu27pmxyzamoim3jqff6qd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://37izr5yow5d673agew22miyy3inbqncuv7gfp5372yciuzvadqef66yd.onion |
Screen |
|
⬇️ |
Never |
http://d2wqt4kek62s35hjeankc75nis4zn4e5i6zdtmfkyeevr7fygpf2iiid.onion |
|
403 Forbidden |
⬆️ |
2025-08-20 |
http://sclj2rax5ljisew3v4msecylzo7iieqw25kcl7io4szei4qcujxixaid.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://xyy2fymbdytltylyuicasuvw7vw3gtgm3cvvjskh4jnzfg3gp7dqgnqd.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://heac3upmfv33scnkeek64dqdx2cblv7z256aezluyvgtwsxi2o3coiid.onion/ |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://uss2a5zyeth7sop57zhgqcyafmnbkmoknps3i7anusze77zppp4bf5yd.onion/ |
Screen |
|
⬇️ |
Never |
http://vir3qwnhwtdriaejfsav6fu5y5ikqlyp5ml345eenlk4pxgabqpf4iid.onion/ |
|
|
⬇️ |
2025-04-28 |
http://67cw3reg2revettu2xfhaaaxhoukctplr6u6mhzri5x6uflet5bq56ad.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Bitz Casino — официальный сайт и рабочее зеркало Битс Казино для игры онлайн |
⬆️ |
2025-08-20 |
http://cloak.su/indexo.php |
Screen |
Description
Clop is a ransomware which uses the .clop extension after having encrypted the victim's files. Another unique characteristic belonging with Clop is in the string: "Dont Worry C|0P" included into the ransom notes. It is a variant of CryptoMix ransomware, but it additionally attempts to disable Windows Defender and to remove the Microsoft Security Essentials in order to avoid user space detection.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
HOME | CL0P^_- LEAKS |
⬇️ |
2022-08-19 |
http://ekbgzchl6x2ias37.onion |
Screen |
DDOS Protection |
⬇️ |
2025-08-20 |
http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/ |
Screen |
|
⬇️ |
2024-12-15 |
http://3ws3t4uo7fehnn4qpmadk3zjrxta5xlt3gsc5mx4sztrsy7ficuz5ayd.onion/ |
Screen |
|
⬇️ |
2024-12-15 |
http://amnwxasjtjc6e42siac6t45mhbkgtycrx5krv7sf5festvqxmnchuayd.onion/ |
Screen |
403 Forbidden |
⬇️ |
2024-12-15 |
http://qahjimrublt35jlv4teesicrw6zhpwhkb6nhtonwxuqafmjhr7hax2id.onion/ |
Screen |
404 Not Found |
⬇️ |
2025-01-22 |
http://npkoxkuygikbkpuf5yxte66um727wmdo2jtpg2djhb2e224i4r25v7ad.onion |
Screen |
|
⬇️ |
2025-01-22 |
http://6v4q5w7di74grj2vtmikzgx2tnq5eagyg2cubpcnqrvvee2ijpmprzqd.onion/remote0/ |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://l4rdimrqyonulqjttebry4t6wuzgjv5m62rnpjho3q22a6maf6d5evyd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://frgp3f3u2ddafv4ny7tqn6tc674m6fyymyywoaxot7xskbjmiyhhsyqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://htmxyptur5wfjrd7uvg23snupub2pbtlfelk45n37b3augl2w4eearid.onion/remote0/ |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http:///2vi357dgf4246nvrcsavrt5jsrm7pfqim4t2n3ykzedjim5bzqezmlyd.onion |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
TORRENT | CL0P^_- LEAKS |
⬇️ |
2024-07-15 |
http://toznnag5o3ambca56s2yacteu7q7x2avrfherzmz4nmujrjuib4iusad.onion/ |
Screen |
Description
Colossus ransomware was first observed in September 2021, when ZeroFox researchers uncovered the variant attacking a U.S.-based automotive group. It employs a double-extortion model, using Themida packing and sandbox evasion to disable defenses and deliver encrypted payloads. Victims are urged to visit a support site—hosted at a domain like colossus.support—to negotiate payment, or face large-scale data dumps and increasing ransom amounts tied to countdown timers. Operators demonstrated familiarity with RaaS playbooks, drawing architectural parallels to groups like EpsilonRed, BlackCocaine, and REvil/Sodinokibi.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Launched around September 2024, ContFR is a French-speaking RaaS that uses a Tor-hosted platform to provide ransomware embedded in PDF files (targeting both Windows and macOS). The group offers a tiered subscription model—“TEST,” “BASIC,” and “ELITE”—allowing affiliates varying degrees of customization, offline capability, and support based on the package purchased. As of the latest reporting, no victims are publicly listed, though data leak publications likely require a subscription to access. The operation suggests an organized, business‑like structure, distinct from opportunistic one‑off strains.
Links
Page title |
Available |
Last visit |
URL |
Screen |
ContFR - RAAS |
⬆️ |
2025-08-20 |
http://zprxx7sfc26rufggreanowmme5qqouqegr2efnko6erycquwvpq5egid.onion/ |
Screen |
Description
Conti is an extremely damaging ransomware due to the speed with which it encrypts data and spreads to other systems. It was first observed in 2020 and it is thought to be led by a Russia-based cybercrime group that goes under the Wizard Spider pseudonym. In early May 2022, the US government announced a reward of up to $10 million for information on the Conti ransomware gang.
Links
Page title |
Available |
Last visit |
URL |
Screen |
CONTI.News |
⬇️ |
2022-06-21 |
http://continewsnv5otx5kaoje7krkto2qbu3gtqef22mnr7eaxw3y6ncz3ad.onion/ |
|
continews.click |
⬇️ |
2023-10-26 |
http://continews.click |
Screen |
None |
⬇️ |
Never |
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion/ |
|
None |
⬇️ |
Never |
http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/ |
|
None |
⬇️ |
Never |
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/ |
|
None |
⬇️ |
Never |
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion |
|
None |
⬇️ |
Never |
https://contirecovery.best |
|
None |
⬇️ |
Never |
https://contirecovery.top |
|
None |
⬇️ |
Never |
http:// htcltkjqoitnez5slo7fvhiou5lbno5bwczu7il2hmfpkowwdpj3q2yd.onion/ |
|
Description
previous clearnet domain coomingproject.com
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
CoomingProject announcement |
⬇️ |
2022-02-05 |
http://z6mikrtphid5fmn52nbcbg25tj57sowlm3oc25g563yvsfmygkcxqbyd.onion |
|
None |
⬇️ |
2021-05-01 |
http://teo7aj5mfgzxyeme.onion |
|
Description
Core ransomware surfaced in early 2025 as a new variant within the broader Makop family. It employs a single-extortion model, focusing on encrypting files and demanding payment, without public data-leak threats. The malware appends the .core extension to encrypted files and is delivered via typical exploit vectors known to RaaS campaigns. Core does not showcase advanced double-extortion tactics seen in other modern strains, but it stands out for its familial lineage and continued evolution from Makop ancestors.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
CrazyHunter is a rising ransomware threat first detected in early 2025, with particularly dangerous campaigns targeting Taiwanese critical infrastructure sectors such as healthcare, education, manufacturing, and industrial services. Technically sophisticated, its toolkit is composed of approximately 80% open-source tools, including the Prince Ransomware Builder (for encryption), ZammoCide (for defense evasion via BYOVD techniques), and SharpGPOAbuse (enabling lateral movement via Group Policy). In a notable incident like the February attack on Mackay Memorial Hospital, attackers employed a USB-based infection vector, then escalated privileges using vulnerable signed drivers (e.g., zam64.sys) to disable security defenses. The ransomware appends extensions like .Hunted3 and displays “Decryption Instructions.txt” as ransom notes. The group maintains a data leak site where it publicly claims multiple Taiwanese organizations as victims.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Crazyhunter |
⬇️ |
2025-04-03 |
http://7i6sfmfvmqfaabjksckwrttu3nsbopl3xev2vbxbkghsivs5lqp4yeqd.onion/ |
Screen |
Description
CrossLock ransomware was first observed in April 2023, targeting an IT services firm in Brazil using a double‑extortion approach—encrypting data and threatening to leak it publicly. Written in Go, it uses a hybrid encryption scheme combining ChaCha20 for file encryption with Curve25519 for key protection. Victims see their files renamed with the .crlk extension and ransom notes titled ---CrossLock_readme_To_Decrypt---.txt. The malware includes advanced techniques like Event Tracing for Windows (ETW) bypass and process mimicking (e.g., Cybereason processes) for stealth. It was publicly tracked until July 2023, after which activity (and its leak site) went offline.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Cross Lock - Data leak |
⬇️ |
2023-07-28 |
http://crosslock5cwfljbw4v37zuzq4talxxhyavjm2lufmjwgbpfjdsh56yd.onion/ |
Screen |
Description
also known as “Fantomas”.
Cryakl first appeared in 2014, spreading primarily across Eastern Europe and Russia via phishing emails with malicious attachments. It uses an asymmetric RSA-based encryption scheme, appending victim-specific IDs and contact emails into filenames and ransom notes. The ransomware operates under a RaaS-like model, distributing builds to affiliates for broader dissemination. In 2018, Belgian law enforcement seized Cryakl’s command-and-control infrastructure and recovered decryption keys, enabling victims to restore files via free tools like Kaspersky’s RakhniDecryptor and the NoMoreRansom project.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
CryLock is a ransomware variant that emerged around April 2020, evolving from the Cryakl (Fantomas) ransomware family. It follows a semi-affiliate model, offering customizable options for partners—such as variable encryption routines, network scanning for lateral movement, shadow copy deletion, and process termination—and flexible delivery methods. During encryption, CryLock renames files to include the developer email, a unique victim ID, and a randomized three-letter extension. Victims typically encounter a countdown timer in a pop-up ransom message that warns about escalating ransom costs and potential loss of decryption capabilities.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://d57uremugxjrafyg.onion |
|
Description
Crynox (sometimes referred to as “Crynox Ransomware”) appears to be a generic file-locker threat that appends .crynox to encrypted files and drops a ransom note (read_it.txt) instructing victims to contact crynoxWARE@proton.me. It seems to use RSA-4096 and AES for encryption and may change desktop wallpaper, but there's no evidence of double-extortion or leak site operation. Distribution methods cited include phishing, pirated software, and malicious websites.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
|*| CRYP70N1C0D3 Team |*| |
⬇️ |
2025-08-19 |
http://7k4yyskpz3rxq5nyokf6ztbpywzbjtdfanweup3skctcxopmt7tq7eid.onion/databases.html |
Screen |
Description
.crYpt
MD5: 54EFAC23D7B524D56BEDBCE887E11849
Babuk Variant
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
https://lhwhi2kmewfas6tk47psgvqyluz5iwgdll5g6jyknq6rvxxg6soqooqd.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Home |
⬇️ |
2023-09-20 |
http://crypuglupv3bsqnbt5ruu5lgwrwoaojscwhuoccbmbzmcidft5kiccqd.onion |
Screen |
None |
⬇️ |
Never |
http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion |
|
Description
CryptedPay is a standalone ransomware strain observed around early 2025, that encrypts files using AES-256 and appends the .CRYPTEDPAY extension. Victims receive a ransom note (README.txt), have their desktop wallpaper changed, and are instructed to pay approximately $280 in Monero (XMR). The ransomware imposes a 62-hour deadline, threatening permanent file loss if not paid.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
CryptNet is a newer Ransomware-as-a-Service (RaaS) operation first identified in April 2023. It follows a double-extortion model, performing data exfiltration before encrypting files. Written in .NET and obfuscated with .NET Reactor, CryptNet utilizes AES-256 (CBC) and RSA-2048 encryption. Its codebase shares strong similarities with Chaos and Yashma ransomware families.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
CryptNet RECOVERY |
⬇️ |
2023-10-17 |
http://cryptr3fmuv4di5uiczofjuypopr63x2gltlsvhur2ump4ebru2xd3yd.onion |
Screen |
CryptNet NEWS |
⬇️ |
2023-10-17 |
http://blog6zw62uijolee7e6aqqnqaszs3ckr5iphzdzsazgrpvtqtjwqryid.onion/ |
Screen |
Description
aka Public Data Storage
Crypto24 emerged in early 2025 as a fast-growing double-extortion ransomware-as-a-service (RaaS) group. It targets organizations across industries such as financial services, healthcare, logistics, and technology, with notable victims in Malaysia, Colombia, Egypt, and India. The group executes rapid infiltration—often leveraging stolen credentials—encrypts files (appending the .crypto24 extension), and exfiltrates significant volumes of data (e.g., 2 TB from Vietnam’s CMC Group). Affiliate-oriented operations are indicated by their presence on RAMP forums, suggesting professional recruitment and offering free decryption for small file samples to entice victims.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
CRYPTO24 | Data Leak Site |
⬆️ |
2025-08-20 |
http://j5o5y2feotmhvr7cbcp2j2ewayv5mn5zenl3joqwx67gtfchhezjznad.onion/ |
Screen |
|
⬇️ |
2025-05-03 |
http://j5o5y2feotmhvr7cbcp2j2ewayv5mn5zenl3joqwx67gtfchhezjznad.onion:5050/data |
Screen |
Description
CryptXXX is a ransomware strain that first appeared in April 2016, developed by the same group behind the Reveton and Angler Exploit Kit operations. It uses a single-extortion model, encrypting victim files with RSA-4096 and AES-256 encryption, appending the .crypt or .crypt1 extensions in early versions, and later variants dropping different extensions. Distribution was largely via the Angler and Neutrino exploit kits, targeting unpatched browsers, plugins, and malicious email attachments. CryptXXX also included credential theft capabilities, harvesting from browsers and FTP clients, and in some variants, a file-stealing module. Notable campaigns affected victims globally, with a strong concentration in North America and Europe. Operations were disrupted in mid-2016 when security researchers from Kaspersky Lab released decryption tools, forcing the group to release updated, harder-to-crack versions.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://apvc24autvavxuc6.onion/ |
|
Description
Crysis ransomware was first identified in early 2016 and is a long-running family that later evolved into the Dharma ransomware line. It follows a Ransomware-as-a-Service (RaaS) model, allowing affiliates to customize email addresses, extensions, and ransom notes. Crysis primarily spreads via malicious email attachments, remote desktop protocol (RDP) brute-force attacks, and software cracks. It uses strong hybrid encryption—AES for file content and RSA for key protection—and appends various extensions such as .crySis, .wallet, or attacker-specified tags. It also deletes shadow copies to hinder recovery. Over the years, it has targeted businesses and individuals worldwide, with notable prevalence in healthcare, manufacturing, and professional services sectors. In 2017, law enforcement released master decryption keys through the NoMoreRansom project, enabling recovery for earlier versions, though newer builds remain active in the wild.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Cs‑137 is a newly observed ransomware strain that first appeared in January 2025. It employs the ChaCha20 cipher for encryption and appends obfuscated filenames with a random 10-character alphanumeric identifier while preserving the original file extension. In its current testing phase, it drops a ransom note with a randomized filename (e.g. ABCDEF-README.txt) and sets a randomly named image file as the desktop wallpaper. The note references a Tor-based extortion portal—though access is not yet active, indicating the operation’s early development stage. The strategy suggests single-extortion behavior, focused on disrupting access rather than data theft or leak threats.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
aka Critroni
CTB‑Locker emerged in mid‑2014, introducing a new era of ransomware by leveraging elliptic curve cryptography (ECC), Tor-based C&C communication, and Bitcoin payments—earning its name from “Curve-Tor-Bitcoin Locker.” It was packaged and sold as a ransomware kit for approximately $1,500–$3,000, allowing affiliates to deploy customized campaigns. The malware encrypts user data (including network and removable drives), changes desktop wallpapers, and appends file extensions like .CTBL, .CTB2, or randomized strings. Victims receive instructions for payment, typically within a limited timeframe, or risk permanent data loss. In 2015–2017, law enforcement and cybersecurity firms (including McAfee and Kaspersky) disrupted the network, arrested operators, and facilitated decryption tools.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://ohmva4gbywokzqso.onion/ |
|
|
⬇️ |
Never |
http://tmc2ybfqzgkaeilm.onion |
|
Description
Cuba ransomware, active since at least 2019, is a financially motivated threat group operating a double-extortion scheme—encrypting files and exfiltrating data to pressure victims. It has targeted government agencies, healthcare providers, critical infrastructure, financial institutions, and manufacturing firms, primarily in the United States, Canada, and Europe. Distribution often involves the Hancitor (Chanitor) malware loader, phishing campaigns, and exploitation of vulnerabilities in public-facing services such as Microsoft Exchange. Cuba employs RSA and AES encryption, typically appending the .cuba extension to affected files, and drops ransom notes instructing victims to contact the attackers via Tor-based portals. In December 2021, the FBI reported that Cuba ransomware operators had compromised at least 49 entities in U.S. critical infrastructure sectors, stealing data and demanding multimillion-dollar ransoms.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Cuba |
⬇️ |
2022-08-28 |
http://cuba4mp6ximo2zlo.onion |
Screen |
Cuba |
⬇️ |
2024-02-08 |
http://cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion/ |
Screen |
|
⬇️ |
Never |
http://i34gbmo5rxx3bxc4yl7f4erkyo2oldwavhpdragnjjvhni6fwvptp2id.onion |
|
|
⬇️ |
Never |
https://kcfgfs7cclscxloy3bf2xtwnayimawtzrbfirfbvl47xt7n2brfiizyd.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://p6lm43x2ntdgx5ixdqfmhrniz7rxv7xtiudbyicwcpir6oeig7jhrfyd.onion |
|
None |
⬇️ |
Never |
http://wun2vkbns2ypyxfe7wffycdgbxsym564eamfk27py3pesqxikqpqfoyd.onion |
|
Description
Cyclops ransomware was rebranded as Knight around mid‑2023, emerging initially in early 2023. It operates as a Ransomware-as-a-Service (RaaS), targeting multiple platforms including Windows, macOS, Linux, and ESXi systems. Crafted in Go, it uses strong encryption algorithms like ChaCha20 and Curve25519. Knight includes both a full and "lite" encryptor, supports batch attacks, hosts a Tor leak site, and offers a web portal for affiliates—positioning itself as a scalable and partner-friendly ransomware operation. Affiliates can manage deployments, track payments, and negotiate with victims through a sophisticated RaaS platform.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Blog | Knight |
⬇️ |
2023-10-13 |
http://nt3rrzq5hcyznvdkpslvqbbc2jqecqrinhi5jtwoae2x7psqtcb6dcad.onion/ |
Screen |
|
⬇️ |
Never |
http://wy35mxvqxff4vufq64v4rrahxltn6ry33hjoogydwti6wbqutjaxrvid.onion/clients/chat/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
D0glun is a crypto-ransomware strain first observed in January 2025, believed to be derived from Babuk via an intermediary variant known as Cheng Xilun. It uses AES-256 symmetric encryption and appends filenames with patterns such as .@D0glun@<original extension> or similar. The malware encrypts files rapidly, changes the desktop wallpaper, and drops ransom notes typically named @[email protected], Desktopcxl.txt, or help.exe. The campaign has shown signs of shared infrastructure and code reuse from Cheng Xilun, but there is no confirmed evidence of a large-scale or mature operation. Its activity so far suggests it is being tested or deployed by a small group or individual rather than a structured affiliate network.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://33333333h45xwqlf3s3eu4bkd6y6bjswva75ys7j6satex5ctf4pyfad.onion |
|
Description
D4rk4rmy is a data-extortion focused threat actor that emerged in mid-2025, targeting high-profile organizations across sectors like financial services, hospitality, and education. It operates primarily through leak site extortion rather than encryption, listing prominent entities—such as Bridgewater Associates, Magellan Financial, Onex Canada Asset Management, Tsai Capital, Casino de Monte-Carlo, and others—on its Tor-based platform. The group has also hit victims in technology, logistics, and university sectors across multiple continents. Their tactic centers on reputation manipulation and public exposure to pressure victims into negotiations.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
D4RK4RMY – 共产主义勒索软件党 |
⬆️ |
2025-08-20 |
http://d4rkd2fybtclo44hss2dpqpw7gmofboxhruax2az3uejw7puxxbpkvqd.onion/ |
Screen |
Description
Dagon Locker is a double-extortion ransomware family that surfaced around September 2022. It represents an evolution of the MountLocker and Quantum ransomware lines. The group employs strong encryption using ChaCha20 protected by RSA-2048 and appends the .dagoned extension to encrypted files. It provides operators flexibility through command-line options to control encryption behavior, such as skipping logs, deletions, or process termination. Notably, Dagon Locker is frequently distributed via phishing campaigns and as part of Brodin-based initial access chains. It operates under a Ransomware-as-a-Service (RaaS) model, engaging affiliates to launch customized campaigns—particularly targeting organizations in South Korea.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://dgnh6p5uq234zry7qx7bh73hj5ht3jqisgfet6s7j7uyas5i46xfdkyd.onion/?cid= |
|
Description
Daixin Team is a ransomware and data extortion group active since at least June 2022, known for targeting the healthcare sector, including hospitals, clinics, and related service providers. The group employs a double-extortion model—exfiltrating sensitive data before encrypting systems—and has leaked protected health information (PHI) to pressure victims. Intrusions often involve exploiting VPN vulnerabilities (notably in Fortinet FortiOS) and using compromised credentials for initial access. The ransomware uses AES for file encryption with RSA to protect the keys, and ransom notes direct victims to a Tor-based portal. The U.S. CISA, FBI, and HHS have issued joint advisories warning of the group’s impact on healthcare delivery and patient safety
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Data Leak |
⬆️ |
2025-08-20 |
http://7ukmkdtyxdkdivtjad57klqnd3kdsmq6tp45rrsxqnu76zzv3jvitlqd.onion/ |
Screen |
|
⬇️ |
Never |
http://232fwh5cea3ub6qguz3pynijxfzl2uj3c73nbrayipf3gq25vtq2r4qd.onion |
|
Data Leak |
⬆️ |
2025-08-20 |
http://7ukmkdtyxdkdivtjad57klqnd3kdsmq6tp45rrsxqnu76zzv3jvitlqd.onion |
Screen |
|
⬇️ |
2025-05-23 |
http://htz6biyazjyzzxllx4knuvux26xa2ixyjshjtwtgq4cm3vczylikm3id.onion |
Screen |
|
⬇️ |
Never |
http://kolbh6putvp6aw3vpmsppor4kyzs7ctxfbp2donetycftz5jru73ytid.onion |
|
|
⬇️ |
Never |
http://kyk6lixosktvbtf3g6zte7kdzid2lwrprfod55mhwunafx6jzeoui7yd.onion |
|
|
⬇️ |
Never |
http://pkx3r7xe42z7fgkjjbocf7okdh77bsvngwvp6arykksob7gleyswicyd.onion |
|
|
⬇️ |
Never |
http://qlfnwdg2fyvmzmqkk33iwku32ynsbbk6hysorsvvadr4o7gfzs4t46yd.onion |
|
|
⬇️ |
Never |
http://r3h2balq6aa7plwe5p5bhxzwzxusrtldbfaamfseg33a5hk77bohzxyd.onion |
|
|
⬇️ |
Never |
http://v66nzl27xxmrulq6c2plrzr7tryv2idflhclpoyxrrn3kfw5gkkpveid.onion |
|
Index of /data/gift1/ |
⬇️ |
2025-05-23 |
http://htz6biyazjyzzxllx4knuvux26xa2ixyjshjtwtgq4cm3vczylikm3id.onion/data/gift1/ |
Screen |
Description
dAn0n is a data-extortion actor that first appeared in April 2024. Operating primarily in a leak-focused extortion model, they publish stolen data on a Tor-hosted site rather than encrypting files. Their victims include organizations across sectors like business services, technology, healthcare, transportation, and legal—all largely based in the United States, with a few in Ireland and South Korea. Activity surged in May 2024, landing them in the top 10 most active ransomware actors that month. Despite limited branding efforts, their smaller operational footprint has allowed for swift, targeted breaches that prioritize rapid data exposure over elaborate cryptographic tactics.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
dAn0n |
⬇️ |
2024-10-26 |
http://2c7nd54guzi6xhjyqrj5kdkrq2ngm2u3e6oy4nfhn3wm3r54ul2utiqd.onion/ |
Screen |
Description
Dark Power is a ransomware group first observed in January 2023, known for targeting small to mid-sized organizations across education, healthcare, manufacturing, and information technology sectors. The group uses a double-extortion model, encrypting files and threatening to leak exfiltrated data via a Tor-based site if ransom demands are not met. Written in the Nim programming language, Dark Power ransomware appends the .dark_power extension to encrypted files and drops a ransom note named README.txt, giving victims 72 hours to contact them. The note typically demands payment in cryptocurrency and offers to negotiate. Victims have been observed in North America, Asia, and Europe, with attacks often involving exploitation of vulnerable public-facing systems or stolen credentials.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Dark Power Ransomware |
⬇️ |
2023-03-15 |
http://powerj7kmpzkdhjg4szvcxxgktgk36ezpjxvtosylrpey7svpmrjyuyd.onion/ |
Screen |
Description
Dark Angels is a highly targeted ransomware and data-extortion group that emerged in spring 2022. Rather than using an affiliate-driven model, it orchestrates discreet, high-impact attacks on large organizations—often choosing one Fortune-level victim at a time. The group exfiltrates massive volumes of data (sometimes 10–100 TB), optionally deploys encryption on Windows or ESXi systems, and pressures victims via a Tor-hosted leak platform ("Dunghill Leak"). Their notable incidents include extorting a record $75 million from a Fortune 50 company in 2024 and demanding around $51 million from Johnson Controls. Dark Angels’ operations emphasize stealth and precision over disruption, often avoiding high-profile media exposure and operating with low operational visibility.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
https://wemo2ysyeq6km2nqhcrz63dkdhez3j25yw2nvn7xba2z4h7v7gyrfgid.onion/ |
|
Description
DarkBit is a politically motivated ransomware operation active since February 2023, targeting academic and public sector entities—most notably including attacks against Israeli institutions like the Technion. Written in Go (Golang) and leveraging powerful encryption routines, it employed AES-256 and supported command-line options for customizable deployments. Its behavior includes deleting volume shadow copies and encrypting files with a randomized prefix and .Darkbit extension. The group deployed their own Tor-based negotiation portal and utilized Tox messaging for communication. Their messaging contained anti-government rhetoric, suggesting ideological motivations in addition to cyber-extortion objectives.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Error |
⬇️ |
2023-02-15 |
http://iw6v2p3cruy7tqfup3yl4dgt4pfibfa3ai4zgnu5df2q3hus3lm7c7ad.onion |
Screen |
DarkBit |
⬇️ |
2023-02-15 |
http://iw6v2p3cruy7tqfup3yl4dgt4pfibfa3ai4zgnu5df2q3hus3lm7c7ad.onion/support/ |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://afiocd14efgh5hu8ijkl9012m.onion |
|
Description
DarkRace is a moderately destructive ransomware strain observed since 2024. It encrypts files and appends a randomized extension (e.g., .1352FF327) that varies per victim. Implemented as a 32-bit Windows application, it disables antivirus defenses, deletes volume shadow copies, terminates processes, and drops ransom note files for payment negotiation. Technical weaknesses in its encryption have enabled developers to produce a universal decryptor that works against DarkRace and related variants.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
404 Not Found |
⬇️ |
2023-06-21 |
http://wkrlpub5k52rjigwxfm6m7ogid55kamgc5azxlq7zjgaopv33tgx2sqd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
https://darkrypt.io |
|
Description
FireEye describes DARKSIDE as a ransomware written in C and configurable to target files whether on fixed, removable disks, or network shares. The malware can be customized by the affiliates to create a build for specific victims.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion |
|
None |
⬇️ |
Never |
http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/ |
|
None |
⬇️ |
Never |
http://darksidedxcftmqa.onion/ |
|
Description
DarkVault is a versatile and opportunistic threat actor first observed in late 2023. Rather than being a traditional ransomware operation, it acts broadly as a data broker and extortion ensemble, publishing victim information—like company names and industries—via Tor-leak sites. Activities reportedly include doxing, website defacement, bomb threats, malware distribution, and swatting, suggesting a diversified cybercriminal portfolio beyond simple ransomware, often framed as an "exclusive online community." While the leak site design mirrors LockBit 3.0, there is no verified technical evidence linking DarkVault to LockBit's codebase. No ransomware executables or encryption tools have been confirmed; its role appears centered on data exposure and extortion without enforced file encryption.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
DarkVault BLOG |
⬇️ |
2025-01-16 |
http://mdhby62yvvg6sd5jmx5gsyucs7ynb5j45lvvdh4dsymg43puitu7tfid.onion |
Screen |
403 Forbidden |
⬇️ |
2025-01-16 |
http://kkvanuf7on5uglvdhihy627w5pxwcmhl6pxik7rwef6y7crt6wj4hjqd.onion/ |
Screen |
Description
Written in python
Links
Page title |
Available |
Last visit |
URL |
Screen |
DarkWave |
⬆️ |
2025-08-20 |
http://sm76tw7iliyprkyeywcac4s6fnqrkyujyezi3xdr4bkebz5edi2kh6ad.onion/ |
Screen |
Description
Darky Lock is a commodity-style ransomware strain first identified in July 2022, derived from publicly available Babuk source code. Victim systems undergo file encryption with an added “.darky” extension, and a “Restore-My-Files.txt” ransom note is placed in all impacted locations. The malware attempts to disable backup mechanisms, including shadow copies and specific applications. Its distribution leverages phishing and trojanized installers, complemented by payloads dropped via frameworks like Empire, Metasploit, and Cobalt Strike.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
DataCarry is a newly observed ransomware and data-extortion operation, first seen in May 2025. It operates a double-extortion model, exfiltrating data and threatening publication via a Tor-hosted portal. The group has already claimed multiple victims across diverse sectors including insurance, healthcare, real estate, retail, and aerospace in countries such as Latvia, Belgium, Türkiye, South Africa, Switzerland, Denmark, and the United Kingdom. The rapid emergence and multi-country reach signal a well-organized operation.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
DATACARRY |
⬆️ |
2025-08-20 |
http://dcarryhaih5oldidg3tbqwnde4lxljytnpvberrwgj2vlvunopd46dad.onion/ |
Screen |
Description
DataF Locker is a ransomware variant first observed in 2024, closely tied to the Babuk ransomware lineage. It operates under a double-extortion model, encrypting files by appending the .dataf extension and threatening to leak exfiltrated data if the ransom isn't paid. Victims receive a ransom note named How To Restore Your Files.txt, with satisfaction of specified recovery procedures. Observations suggest use of typical intrusion vectors such as phishing, exploit tools, or leaked credential abuse, although detailed delivery methods and leak infrastructure remain under-documented in high-tier intelligence reports.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://pg3n5bteiatjf6rt7oa4xhzo4sj736rifjmk4gtowxjljuwwdv6mccyd.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
DataLeak |
⬇️ |
2023-02-22 |
http://woqjumaahi662ka26jzxyx7fznbp4kg3bsjar4b52tqkxgm2pylcjlad.onion/ |
Screen |
|
⬇️ |
2023-02-22 |
http://woqjumaahi662ka26jzxyx7fznbp4kg3bsjar4b52tqkxgm2pylcjlad.onion/atom.xml |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
DeathGrip is a Ransomware-as-a-Service (RaaS) that emerged around June 2024, offering malware payloads built with leaked LockBit 3.0 and Yashma/Chaos builders. Designed to lower technical barriers, it enables even low-skilled operators to deploy highly capable ransomware attacks. DeathGrip campaigns typically employ AES-256 encryption, delete shadow copies and recovery features, and modify system settings to hinder restoration. Earlier infections include low-tier ransom demands (e.g., around $100), reflecting entry-level targeting, though its flexible tooling allows a range of payload configurations.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
DeathRansom is a ransomware family first seen in the wild in late 2019, initially appearing as a bluff—dropping ransom notes without actually encrypting files. By early 2020, the malware evolved into a functional encryptor, using a hybrid scheme of AES for file encryption and RSA to secure AES keys. Infected systems have files appended with extensions such as .wctc or .zzz depending on the campaign variant. Distribution methods include phishing emails with malicious attachments, cracked software downloads, and malicious spam campaigns. Over time, some DeathRansom operations were linked to STOP/Djvu infrastructure and later incorporated into affiliate-based criminal ecosystems.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
DevMan is a ransomware variant first observed in April 2025. It is a customized derivative of the DragonForce family, leveraging attacker-operated infrastructure for double-extortion, where both data theft and encryption are employed to pressure victims. The threat is highly organized, targeting sectors such as technology, construction, public services, healthcare, and consumer services across Asia, Africa, and Europe.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Devman's Place |
⬇️ |
2025-06-16 |
http://qljmlmp4psnn3wqskkf3alqquatymo6hntficb4rhq5n76kuogcv7zyd.onion/ |
Screen |
Description
DevMan 2.0 is the evolved iteration of the DevMan ransomware, first documented in July 2025. It enhances the capabilities of its predecessor with robust double-extortion tactics and operates under a Ransomware-as-a-Service (RaaS) model, offering structured leak and extortion infrastructure. Affiliates and operators are using it across diverse sectors—such as manufacturing, retail, and electronics—targeting organizations in Japan, Germany, and other countries. Demands from initial campaigns range widely, spanning from around $1 million to over $10 million USD.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
DEVMAN 2.0 - Leaked Data |
⬇️ |
2025-08-06 |
http://wugurgyscp5rxpihef5vl6b6m5ont3b6sezhl7boboso2enib2k3q6qd.onion/ |
Screen |
Description
Dharma is a prolific ransomware family active since at least 2016, evolving from the earlier CrySiS ransomware. It operates under a Ransomware-as-a-Service (RaaS) model, allowing affiliates to deploy customized builds with their own contact emails and extensions. Dharma typically appends encrypted files with patterns like .id-[victimID].[email].dharma or other campaign-specific suffixes. Initial access is often gained through exposed Remote Desktop Protocol (RDP) services secured with weak or stolen credentials, sometimes combined with brute-force attacks. The malware encrypts files using AES with RSA to secure the keys and drops ransom notes in text files and pop-up windows. Numerous variants have emerged over time, each linked to different affiliates, making attribution difficult.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Diavol is a ransomware strain first observed in June 2021, associated with the Wizard Spider threat group—best known for operating the TrickBot malware and the Conti ransomware. It uses a double-extortion model, encrypting victim files and exfiltrating sensitive data for additional leverage. The ransomware is written in C and employs a multi-threaded encryption routine using the ChaCha20 algorithm with RSA-2048 to secure encryption keys. Early variants appended no custom extension to files, relying instead on changing file headers, but later versions began appending extensions. Initial access vectors include exploitation of vulnerable systems and the use of TrickBot or BazarLoader infections as staging points. Victims are directed to a Tor-based negotiation portal through ransom notes.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Chat |
⬇️ |
2022-10-31 |
https://7ypnbv3snejqmgce4kbewwvym4cm5j6lkzf2hra2hyhtsvwjaxwipkyd.onion |
Screen |
Description
Dire Wolf is a recently emerged double-extortion ransomware group that first appeared around May 2025. It is a crypto-ransomware and data broker targeting industries like manufacturing and technology across multiple countries, including the U.S., Thailand, Taiwan, Singapore, Türkiye, among others. Written in Go and delivered as a UPX-packed binary, it utilizes robust encryption (Curve25519 and ChaCha20) to lock files with a .direwolf extension, while deleting backups, disabling logging, and terminating key services to block recovery. Victims receive highly customized ransom notes containing live-chat credentials and victim-specific portals, indicating a highly professional and targeted approach.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Dire Wolf |
⬆️ |
2025-08-20 |
http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/ |
Screen |
File Browser |
⬆️ |
2025-08-20 |
http://direwolfgpyqohwxwoetsz7a6p72diu32c3wfysqdx4ei6bwft7zh3yd.onion/ |
Screen |
Description
Dispossessor, active since August 2023, was a data-extortion ransomware-as-a-service group led by the moniker "Brain". The group quickly expanded from U.S.-focused attacks to target small and mid-sized organizations globally—across sectors like healthcare, finance, transportation, education, and manufacturing. Their tactics included exploiting weak passwords and lack of multifactor authentication to gain access, followed by data exfiltration and staged extortion: victims were contacted via email or phone with links to proof-video platforms, and exposed on Tor-based leak sites if no payment was made. Many of the organizations targeted (approximately 43 identified) were across diverse countries including the U.S., Canada, Brazil, India, Germany, and more. By mid-2024, international law enforcement—including the FBI, UK National Crime Agency, and German agencies—successfully dismantled their infrastructure.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Dispossessor.com |
⬇️ |
2024-08-12 |
http://e27z5kd2rjsern2gpgukhcioysqlfquxgf7rxpvcwepxl4lfc736piyd.onion |
Screen |
|
⬇️ |
2025-01-27 |
http://cybertube.video/web/index.html#!/details?id=0c3b52f6e73709725dc6e12b30b139d9&serverId=2be5e68176ff4f8fbb930fe66321ab72 |
Screen |
|
⬇️ |
2024-08-12 |
http://e27z5kd2rjsern2gpgukhcioysqlfquxgf7rxpvcwepxl4lfc736piyd.onion/back/getallblogs |
Screen |
DNS resolution error | dispossessor.com | Cloudflare |
⬇️ |
2025-06-26 |
http://dispossessor.com |
Screen |
DNS resolution error | dispossessor-cloud.com | Cloudflare |
⬇️ |
2025-06-26 |
http://dispossessor-cloud.com |
Screen |
DNS resolution error | cybernewsint.com | Cloudflare |
⬇️ |
2025-06-26 |
http://cybernewsint.com |
Screen |
DNS resolution error | redhotcypher.com | Cloudflare |
⬇️ |
2025-06-26 |
http://redhotcypher.com |
Screen |
Description
Donex is a ransomware family that emerged in early 2022 as a rebrand of the older Muse ransomware. It uses a double-extortion strategy, combining file encryption with threats to leak stolen data on a Tor-hosted portal. Written in C++, Donex encrypts files using a combination of ChaCha20 and RSA-4096 algorithms and appends a custom extension unique to each victim. The group targets a broad range of sectors, including manufacturing, logistics, and professional services, with victims reported across North America, Europe, and Asia. Initial access methods include exploitation of public-facing applications and the use of stolen RDP credentials.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Donex ransomeware leakage - |
⬇️ |
2024-04-02 |
http://g3h3klsev3eiofxhykmtenmdpi67wzmaixredk5pjuttbx7okcfkftqd.onion |
Screen |
Description
Donut Leaks, first reported in August 2022, is a data-extortion group linked to high-profile breaches, including the compromise of Continental in 2022. The group does not consistently encrypt files—in some cases acting purely as a data broker—yet adopts a double-extortion model when ransomware is deployed. Their operations involve exfiltrating sensitive corporate data, then threatening public release via a dedicated leak site on Tor. Donut Leaks has targeted organizations in automotive manufacturing, IT services, and professional sectors, with confirmed victims in Europe and North America. Intrusion methods are not fully documented in public sources but likely include phishing, credential theft, and exploitation of exposed services.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
D0N#T__::LEAKS:: |
⬇️ |
2022-10-26 |
https://sbc2zv2qnz5vubwtx3aobfpkeao6l4igjegm3xx7tk5suqhjkp5jxtqd.onion/ |
Screen |
Login - _d0nut.::Files_ |
⬇️ |
2022-10-26 |
https://doq32rjiuomfghm5a4lyf3lwwakt2774tkv4ppsos6ueo5mhx7662gid.onion |
Screen |
|
⬇️ |
2025-01-21 |
http://sbc2zv2qnz5vubwtx3aobfpkeao6l4igjegm3xx7tk5suqhjkp5jxtqd.onion/ |
Screen |
404 Not Found |
⬇️ |
2024-12-29 |
http://dk4mkfzqai6ure62oukzgtypedmwlfq57yj2fube7j5wsoi6tuia7nyd.onion/index.php? |
Screen |
|
⬇️ |
Never |
http://qkbbaxiuqqcqb5nox4np4qjcniy2q6m7yeluvj7n5i5dn7pgpcwxwfid.onion/ |
|
|
⬇️ |
Never |
http://ieflygyfoezms2wshjpfyfz4hpyxjcdtxejntysvopd7n7cmmnucbkad.onion |
|
|
⬇️ |
Never |
http://5zhg2foerm66oqdpmhs52pzfkwqx5rcfhje5j5rltctq5cjs653u3rid.onion |
|
Description
DoppelPaymer is a ransomware family first identified in mid-2019, derived from the BitPaymer codebase and operated by the Evil Corp cybercrime group. It is known for its double-extortion approach, encrypting victim files with AES-256 and securing keys with RSA-2048, while also stealing sensitive data for public release if payment is not made. DoppelPaymer primarily targets large organizations, including those in healthcare, government, and manufacturing, with high ransom demands often in the millions of U.S. dollars. Infection vectors include phishing emails carrying Dridex or other loaders, exploitation of remote access services, and credential theft. Encrypted files typically retain their original name with a new extension, and ransom notes direct victims to Tor-based portals for negotiation. The group has been linked to attacks on institutions such as the City of Torrance, the State of Delaware, and hospital systems in Germany and the United States.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Start-maximized.com |
⬇️ |
2022-02-24 |
http://hpoo4dosa3x4ognfxpqcrjwnsigvslm7kv6hvmhh2yqczaxy3j6qnwad.onion/ |
|
|
⬇️ |
Never |
http://qkbbaxiuqqcqb5nox4np4qjcniy2q6m7yeluvj7n5i5dn7pgpcwxwfid.onion/ |
|
Description
DragonForce is a ransomware-as-a-service (RaaS) group first identified in late 2023. Originally linked to hacktivist activity, the group pivoted to financially motivated operations by early 2024. Since then, it has accelerated into a highly organized cartel-like network, providing customizable payloads to affiliates, a sophisticated affiliate portal, and shared infrastructure for leak sites and campaigns. The group has targeted a wide range of sectors globally, including major UK retailers such as M&S, Harrods, and Co-op, along with organizations in government, logistics, and manufacturing. Its operations are known for strategic branding flexibility, enabling affiliates to operate under their own labels using DragonForce’s backend services.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
DragonForce | Blog |
⬆️ |
2025-08-20 |
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog |
Screen |
DragonForce | Recovery |
⬆️ |
2025-08-20 |
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion/login |
Screen |
DragonForce | Leaks |
⬆️ |
2025-08-20 |
http://dragonforxxbp3awc7mzs5dkswrua3znqyx5roefmi4smjrsdi22xwqd.onion |
Screen |
|
⬇️ |
Never |
http://zsglo7t7osxyk3vcl7zxzup7hs4ir52sntteymmw63zvoxzcqytlw7qd.onion/ |
|
|
⬇️ |
Never |
http://6dgi54prfmpuuolutr4hl3akasxbx4o34g5y2bj4blrvzzkjemhxenad.onion/ |
|
|
⬇️ |
Never |
http://eogeko3sdn66gb7vjpwpmlmmmzfx7umtwaugpf5l6tb5jveolfydnuad.onion/ |
|
|
⬇️ |
Never |
http://ewrxgpvv7wsrqq7itfwg5jr7lkc6zzknndmru5su2ugrowxo3wwy5yad.onion/ |
|
|
⬇️ |
Never |
http://3ro23rujyigqrlrwk3e4keh3a3i6ntgrm3f42tbiqtf7vke47c6a6ayd.onion/ |
|
|
⬇️ |
Never |
http://jziu7k7uee467r2wt66ndrwymmw7tsmqgcqi7aemcaxraqmaf2hdm3yd.onion/ |
|
|
⬇️ |
Never |
http://2yczff6zyiey3gkgl5anwejktdp73abxbzbnvwobmrwkwgf3hudpyvyd.onion/ |
|
|
⬇️ |
Never |
http://bpoowhokr3vi32l3t4mjdtdxfrfpigwachopk5ojwmgxihnojhsawuyd.onion/ |
|
|
⬇️ |
Never |
http://dbvczza7nhwdb5kdvkzjtkrcvwnrt5viw7mihutueprvajy7rxhwq6id.onion/ |
|
|
⬇️ |
Never |
http://xtcwd3xmxpggtizn7kmwwqeizexflkkyqsytg2kauccau6ddsfa4gfyd.onion/ |
|
|
⬇️ |
Never |
http://4wcrfql53ljekid3sn66z6swjot725muveddq77utxltaelw64eikfid.onion/ |
|
|
⬇️ |
Never |
http://73h3lxn24kuayyfkn4t6ij7e67jklo24vqzqdhpts3ygmim7hu6u6aid.onion/ |
|
|
⬇️ |
Never |
http://nwtetzmrqhxieetg5lvth7szzvg35gfrqt23ly46vku56oo7pkueswyd.onion/ |
|
|
⬇️ |
2025-04-27 |
http://dszmdx3jr7vggdaf2c5k4qunt4mxclelhgbtjlgewlkmlnfpsnsg3sad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://fsguestuctexqqaoxuahuydfa6ovxuhtng66pgyr5gqcrsi7qgchpkad.onion/ |
Screen |
Description
Dunghill Leak is the publicly branded data leak site (DLS) operated by the Dark Angels ransomware group, established circa January 2023. Rather than a standalone encryption threat, it serves as the disclosure and extortion platform where stolen victim data is published if ransom demands are ignored. Dark Angels is known for highly targeted “big game hunting” tactics, exfiltrating tens to hundreds of terabytes of corporate data, often without encrypting systems. Victims include major industry players—like Johnson Controls, Sabre, Sysco, and a Fortune 50 firm—which reportedly paid a record-breaking $75 million USD ransom. The leak site is complemented by a mirrored Telegram channel for distributing victim announcements and maintaining negotiation traffic.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Dunghill Leak - Details |
⬇️ |
2024-07-23 |
http://p66slxmtum2ox4jpayco6ai3qfehd5urgrs4oximjzklxcol264driqd.onion/index.html |
Screen |
Dunghill Leak - Details |
⬇️ |
2025-07-21 |
http://nsalewdnfclsowcal6kn5csm4ryqmfpijznxwictukhrgvz2vbmjjjyd.onion/ |
Screen |
Home |
⬆️ |
2025-08-20 |
https://5kvv27efetbcqgem4tl7jsolvr3jxkrbmn23rcjzl7kvqycxuao3t4ad.onion/ |
Screen |
|
⬇️ |
Never |
http://p242scyqdujesnozehk4ecfshk6i357cjywv3vzywrera3bndko4pgyd.onion |
|
|
⬇️ |
Never |
http://r4znrcbthzjclilled5yyrjy35gagoyfwvekiqih7btzrchvqdmgviqd.onion |
|
|
⬇️ |
Never |
http://sldltcn2d6mgtp66vgmvjptdtwgqyyewsjgwkzjybq3x55plzw4tefid.onion:3452 |
|
|
⬇️ |
2025-03-31 |
http://zroxb37ghsh2xkwrkfkyz65jmuv6goaltcqxohk4syziahgjv5zou5qd.onion |
Screen |
Description
The QNAPCrypt ransomware works similarly to other ransomware, including encrypting all files and delivering a ransom note. However, there are several important differences:
1. The ransom note was included solely as a text file, without any message on the screen—naturally, because it is a server and not an endpoint.
2. Every victim is provided with a different, unique Bitcoin wallet—this could help the attackers avoid being traced.
3. Once a victim is compromised, the malware requests a wallet address and a public RSA key from the command and control server (C&C) before file encryption.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2023-09-06 |
http://veqlxhq7ub5qze3qy56zx2cig2e6tzsgxdspkubwbayqije6oatma6id.onion |
Screen |
|
⬇️ |
2025-07-02 |
http://7zvu7njrx7q734kvk435ntuf37gfll2pu46fmrfoweczwpk2rhp444yd.onion |
Screen |
Description
Egregor is a ransomware strain that appeared in September 2020, widely believed to be a rebrand or successor to the Maze ransomware operation, using similar infrastructure and tactics. It runs as a Ransomware-as-a-Service (RaaS), recruiting affiliates to deploy its payload in exchange for a percentage of ransom payments. Egregor employs a double-extortion model, encrypting files with ChaCha and RSA-2048 algorithms, while exfiltrating sensitive data to threaten public release. Victims receive ransom notes directing them to Tor-based portals for negotiation. The group has targeted organizations worldwide across sectors such as retail, transportation, manufacturing, and finance, with notable attacks on Barnes & Noble and Cencosud. Egregor's operations were disrupted in early 2021 through coordinated law enforcement action, leading to the arrest of suspected affiliates in Ukraine.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://egregoranrmzapcv.onion/ |
|
Welcome page |
⬆️ |
2025-08-20 |
http://egregornews.com |
Screen |
Description
This group is believed to be connected to Lost Trust. El Dorado rebranded to BlackLock in September 2024.
User "$$$" on RAMP is known to be connected to the group.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
DragonForce | Oops... |
⬇️ |
2025-03-28 |
http://dataleakypypu7uwblm5kttv726l3iripago6p336xjnbstkjwrlnlid.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion |
Screen |
|
⬆️ |
2025-08-20 |
http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion/Url=4094dd92-0f91-4699-8328-fdb7070a8230 |
Screen |
|
⬇️ |
2025-02-16 |
http://panela3eefdzfzxzxcshfnbustdprtlhlbe3x2fqomdz7t33iqtzvjyd.onion/ |
Screen |
None |
⬇️ |
Never |
http://26ubgm3vvrjawkdyfhvl2d2nhq77nu3zsagbih4yy2zgau5uv5ivfgyd.onion |
|
BlackLock |
⬆️ |
2025-08-20 |
http://zdkexsh2e7yihw5uhg5hpsgq3dois2m5je7lzfagij2y6iw5ptl35gyd.onion/ |
Screen |
None |
⬇️ |
Never |
http://4ozbomcjurd64vgeblkoqeqirvawi3dddswriw6qespscmequmqlshyd.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://leaksbcwijsbkxcx76s24qi4ab4jn7rgtzzyiss7fzco6amhj6h365ad.onion/ |
|
Description
Elpaco is a variant of Mimic ransomware that emerged around August 2023. Designed with significant customization and stealth in mind, it targets Windows systems by abusing the Everything search utility to optimize file discovery and accelerate encryption. Operators exploit various initial access methods—most notably RDP brute-force and the Zerologon vulnerability (CVE-2020-1472)—to gain access, escalate privileges, and deliver the payload. The ransomware uses a 7z SFX dropper, deploys multi-threaded encryption, disables recovery options, and self-deletes after execution, leaving victims with encrypted files bearing Elpaco-specific extensions. It's recognized for its adaptability and advanced features compared to earlier Mimic variants.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Embargo is a Ransomware-as-a-Service (RaaS) operation first observed in May 2024. It employs a double-extortion model, encrypting victim data while exfiltrating sensitive files for publication on a Tor-based leak site. Embargo uses a Rust-based payload that leverages AES-256 and RSA-4096 encryption, deletes volume shadow copies, and disables recovery features to prevent restoration. Its targeting appears opportunistic but has included sectors such as finance, manufacturing, and professional services across North America, Europe, and Asia. The ransomware’s customization options, negotiation portal, and leak infrastructure suggest a closed affiliate model with a focus on operational security.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
EMBARGO |
⬆️ |
2025-08-20 |
http://embargobe3n5okxyzqphpmk3moinoap2snz5k6765mvtkk7hhi544jid.onion/ |
Screen |
EMBARGO |
⬇️ |
2024-06-29 |
http://5ntlvn7lmkezscee2vhatjaigkcu2rzj3bwhqaz32snmqc4jha3gcjad.onion/ |
Screen |
|
⬇️ |
Never |
http://76yl7gfmz2kkjglcevxps4tleyeqnqhfcxh6rnstxj27oxhoxird3hyd.onion |
|
Index of / |
⬇️ |
2025-08-03 |
http://yj3eozlkkxkcsprc2fug7tolgtnllruyavuyyar3yzsccjdgvu2bl2yd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://ufjoe7fdwvml52oin7flwlqksvp3fcvfyh2kwsngt7j2yf7xou52w2qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://i2okedfryhllg6ka6aur3wnxcxdaufbuuysp4drr5xoc6gvqpcogejid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://s37weqmxusvfcxkoorgkut5v7frn27zftdb6pdjsyjl5djg6oxjqjbid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://oftm4u5cfl6wyadj27h3csdxfvyd7favssxcr7l7wnswdsrfedxswxqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://wg55rcy2chmbpeh6pl5pftnveac2lqfxbletrtzanfjhhmvcjnn5tcqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://sbjthwyoxfuxq75b77e2hsj7ie67m3qicfnuikhuabwo3sikvrzyaxad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://zo5xog4vpvdae473doneepetidh36m5czdq2vyeiq3lvqhuel56p6nid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://66ohzao6afsv2opk22r2kv6fbnf2fthe7v4ykzzc5vjezvvyf3gocwyd.onion/ |
Screen |
Apache2 Debian Default Page: It works |
⬇️ |
2025-04-03 |
https://2nn4b6gihz5bttzabjegune3blwktad2zmy77fwutvvrxxodbufo6qid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://y6kyfs2unbfcyodzjrxadn4w5vyulhyotdi5dtiqulxbduujehupunqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://embargobe3n5okxyzqphpmk3moinoap2snz5k6765mvtkk7hhi544jid.onion/api/blog/get |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://3o5ewrzhqoyodfs5kll4cjxagdfrpuu474panwobm4im7ejfpaux5jyd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://4q5tsu5o3msmv4am4dfhupwhzlyg7wv3lpswbvbhcrknr4ega7xetxad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://z2b75lk7xf6kme3zfvlmdmpwiaansnkcuhsojd23dgub5md24fhogcyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-04-03 |
http://7lxwbzlkpjyuahuvngwwkc4mycj2a4flh45ksqjo2ezfdbkmxmlxikad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-03 |
http://7watkqnnuwxvlpgy5gaosgqy67nve3jgpy37xobqngmswz3vuvde56yd.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-12 |
http://5dw7bszmidrhpoltqbqmpixpz6mvgez3mr6xc7ktval2glrmbxkwopad.onion/ |
Screen |
EMBARGO |
⬇️ |
2025-08-19 |
http://a3kvb22nuhfgaluy6uzufrjn3azzsu7tylszdbyne3kiextdmxz4nnyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-12 |
http://ec6edgevw2lzqy4ipafpbvjuu7r6ugqbljqokl3pvecc6c3a5ix3wgyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-06-19 |
http://qrthxx5hkttfl3pk57eou6ddqi34pxsibxvndq7vt5pblqbaurkmxbqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-06-19 |
http://usu2gxoiijvnswhfymd6ucjjwhtgqby4c4ywzvnrtw4i6mpgppvzpsad.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-12 |
http://qk5nd25xdnygqrey7al2tb3xop5brk7kxua7xr2zrgftzked43bku4yd.onion/ |
Screen |
Index of / |
⬇️ |
2025-07-12 |
http://p474ku5ehoex7mfsbdenppakbb4twvrnvggjzhp53xw4z5qq6glm4yad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-06 |
http://vh2wkazjlflm6pvwtvw2fnztu3dcw4346lasvikzeg25yhx6bjvl5pqd.onion/ |
Screen |
|
⬇️ |
Never |
http://rngjexyyyl5mek5kg2lkxilqfef5nr6bpa4u24i5ei5hb3ydsh5drpid.onion/ |
|
|
⬇️ |
Never |
http://tamvd5fdyvpekhaf2sdg5sum73ra2abc4h2iqihijpvw4hythnlmuhid.onion/ |
|
Index of / |
⬇️ |
2025-08-06 |
http://jolfnfw6lmcjsppgjfimhimqt2t7viybk67yc5zkxip6fxrcgo7mv4id.onion/ |
Screen |
Description
aka xoriste
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Endurance is a destructive ransomware variant first observed in 2023, developed and operated by the threat actor known as IntelBroker (also referred to as Butler Spider). Rather than encrypting files for decryption, it functions primarily as a data wiper, overwriting file contents, appending randomized filenames, and then deleting the files altogether. The source code for the malware was intentionally made public by the operator, indicating its use as both a tool and a statement. Endurance was used in high-profile breaches, including targeting government agencies, large enterprises, and telecommunications providers.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Endurance |
⬇️ |
2023-06-01 |
http://h44jyyfomcbnnw5dha7zgwgkvpzbzbdyx2onu4fxaa5smxrgbjgq7had.onion/ |
Screen |
Description
Entropy is a ransomware first seen in 1st quarter of 2022, is being used in conjunction of Dridex infection. The ransomware uses a custom packer to pack itself which has been seen in some early dridex samples.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Entropy hall of fall |
⬇️ |
2022-02-27 |
http://leaksv7sroztl377bbohzl42i3ddlfsxopcb6355zc7olzigedm5agad.onion/posts |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://dg5fyig37abmivryrxlordrczn6d6r5wzcfe2msuo5mbbu2exnu46fid.onion |
|
Description
Rebrand to Bashe in October 2024.
Eraliegn, self-styled as APT73 and formerly known as Bashe, surfaced in April 2024. Rather than conducting real ransomware campaigns, the group specializes in fabricating data breach narratives, curating or reusing existing leaked data (often from years-old breaches) and presenting it on a Tor-hosted leak site to project credibility. They claim to have breached organizations across sectors—such as banking, travel, manufacturing, and IT—targeting entities in countries including the United Kingdom, India, Indonesia, France, and Canada. However, threat analysis shows these claims are deceptive in nature rather than demonstrative of technical prowess or active network compromise.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Access Blocked |
⬇️ |
2024-06-22 |
http://eraleignews.com/ |
Screen |
APT73 |
⬇️ |
2024-08-29 |
http://wn6vonooq6fggjdgyocp7bioykmfjket7sbp47cwhgubvowwd7ws5pyd.onion/ |
Screen |
BASHE |
⬇️ |
2025-08-08 |
http://basheqtvzqwz4vp6ks5lm2ocq7i6tozqgf6vjcasj4ezmsy4bkpshhyd.onion/ |
Screen |
|
⬇️ |
2025-08-08 |
http://bashe4aec32kr6zbifwd5x6xgjsmhg4tbowrbx4pneqhc5mqooyifpid.onion/ |
Screen |
BASHE |
⬇️ |
2025-08-08 |
http://basherq53eniermxovo3bkduw5qqq5bkqcml3qictfmamgvmzovykyqd.onion |
Screen |
BASHE |
⬇️ |
2025-08-08 |
http://basherykagbxoaiaxkgqhmhd5gbmedwb3di4ig3ouovziagosv4n77qd.onion |
Screen |
BASHE |
⬇️ |
2025-08-08 |
http://bashete63b3gcijfofpw6fmn3rwnmyi5aclp55n6awcfbexivexbhyad.onion |
Screen |
BASHE |
⬇️ |
2025-08-08 |
http://bashex7mokreyoxl6wlswxl4foi7okgs7or7aergnuiockuoq35yt3ad.onion |
Screen |
|
⬇️ |
Never |
http://7bbqrijcds5sgji3kiwo5o5qgxfgoyufykhzfdo6xl3qbdes2e7tdyad.onion |
|
|
⬇️ |
2025-08-08 |
http://bashe4aec32kr6zbifwd5x6xgjsmhg4tbowrbx4pneqhc5mqooyifpid.onion |
Screen |
|
⬇️ |
2025-08-08 |
http://bashed52orwi7qoyvmcfkdnuaogta4inpojfd6cthzkp4qpsq64ux4ad.onion |
Screen |
|
⬇️ |
2025-08-08 |
http://bashedl53memptddxzb4kr5mnkzse4fmhpqeq7jb4srndswar46nofid.onion |
Screen |
|
⬇️ |
2025-08-08 |
http://bashefe5uezp2jtxpk24b2pyfnnfyguicgrgqufgu57mfluegotbeayd.onion |
Screen |
|
⬇️ |
2025-08-08 |
http://bashei5oy4zvmf2letnupwhgprdkjyssm3zxj2oyr6wfezkf3elehzqd.onion |
Screen |
|
⬇️ |
Never |
http://qku4reiyfcs2vqq5tow2uprhyqhweo56lrgs6457svr3ej4ton5frkad.onion |
|
Description
Rebranded to Sabbath.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Everest is a ransomware group active since at least December 2020, known for its double-extortion tactics. The group initially operated as a typical ransomware outfit, encrypting files with strong cryptography and appending victim-specific extensions, but later shifted toward pure data extortion—threatening to sell or release stolen data without necessarily deploying encryption. Everest targets a wide range of sectors, including government, healthcare, manufacturing, and IT services, with confirmed victims in North America, Europe, and Asia. Initial access vectors include exploitation of vulnerable public-facing applications, phishing campaigns, and credential theft for remote access services. The group maintains a Tor-based leak site to publish stolen information and advertise access to compromised networks.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬆️ |
2025-08-20 |
http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/ |
Screen |
Everest Group |
⬇️ |
2025-01-20 |
http://ransomoefralti2zh5nrv7iqybp3d5b4a2eeecz5yjosp7ggbepj7iyd.onion |
Screen |
Index of / |
⬇️ |
2025-03-25 |
http://2vqamwfdpis5rkjtpkutigykp56n6hkxfurm6qukdxp6uz5uff5kkaid.onion/ |
Screen |
404 Not Found |
⬇️ |
2025-02-02 |
http://bifpwatchoxp7tsb2kpes37b23ogjrb2kj4wgr7yncf4hhgsfahu7jad.onion/ |
Screen |
Index of / |
⬇️ |
2025-03-25 |
http://aihvh6j6fbkfjyc6jqbsh2ed4s3rym2v2pu6kd3z3exdso2xc2qwcuqd.onion/ |
Screen |
Description
Ransomware.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://7iulpt5i6whht6zo2r52f7vptxtjxs3vfcdxxazllikrtqpupn4epnqd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Fargo is a ransomware variant that surfaced in 2022, primarily targeting Microsoft SQL Server (MSSQL) systems. Believed to be a variant of the TargetCompany ransomware family, Fargo uses brute-force or credential-stuffing attacks on exposed MSSQL instances to gain access, then executes payloads via SQL Server commands. Once deployed, it encrypts files using a combination of symmetric and asymmetric algorithms, appends the .Fargo3 (or similar) extension, and drops a ransom note directing victims to contact operators via email. It also attempts to delete system backups and shadow copies to prevent recovery. Fargo has been observed targeting organizations in multiple sectors, with a concentration of victims in South Korea and other parts of Asia.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Faust is a variant of the well-known Phobos ransomware, part of a Ransomware-as-a-Service (RaaS) ecosystem active since around May 2019. Faust employs a double-extortion model, encrypting victim files and threatening to release stolen data if ransom demands are not met. It's distributed via Office document payloads using VBA scripts and known for its fileless attack delivery, enabling stealth and evasion.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
FiveHands is a ransomware family first observed in January 2021, believed to be a successor to the HelloKitty ransomware variant. It operates under a Ransomware-as-a-Service (RaaS) model and uses the double-extortion tactic, encrypting files while threatening to leak stolen data via a Tor-based site. FiveHands is written in C# and leverages the NTRUEncrypt algorithm for file encryption alongside Curve25519 for key exchange. The ransomware is commonly deployed via Malwarebytes SombRAT or Cobalt Strike beacons after initial compromise, often gained through exploitation of vulnerable VPNs, phishing, or compromised credentials. FiveHands has targeted organizations in healthcare, finance, and manufacturing across North America, Europe, and Asia.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Fog is a sophisticated ransomware strain first observed in April–May 2024, initially targeting U.S. educational institutions before expanding into sectors such as government, business services, finance, and manufacturing. The group conducts fast, double-extortion attacks: they exploit compromised VPN credentials or known vulnerabilities, deploy encryption (notably using extensions like .fog, .FLOCKED), and exfiltrate data prior to encryption to maximize victim pressure. Fog is associated with other prolific actors—such as Akira and Conti—through shared tooling, infrastructure timelines, and even cryptocurrency wallets.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
500 Internal Server Error |
⬇️ |
2025-06-05 |
https://xql562evsy7njcsngacphc2erzjfecwotdkobn3m4uxu2gtqh26newid.onion/ |
Screen |
Blog |
⬇️ |
2025-04-20 |
http://xbkv2qey6u3gd3qxcojynrt4h5sgrhkar6whuo74wo63hijnn677jnyd.onion |
Screen |
Blog |
⬇️ |
2025-04-20 |
http://xbkv2qey6u3gd3qxcojynrt4h5sgrhkar6whuo74wo63hijnn677jnyd.onion/posts |
Screen |
404: This page could not be found. |
⬇️ |
2025-04-20 |
http://hlbqbuy2bo3onn6h6eq7pbci24kughiaw4rkxrewidnqma3hwwgt2ead.onion |
Screen |
/ |
⬇️ |
2025-05-07 |
http://44dz7r5uduhihaks7m62vztthp5s7thokbgeida7usm4rvakriuvk3yd.onion/ |
Screen |
Google |
⬇️ |
2025-05-07 |
http://nw5zrjqarckmsf22rrgo5yooelpnn5raxhesuhrpzceqibmjwanbbaad.onion/ |
Screen |
Description
Frag is a relatively new ransomware and data extortion group first seen in February 2025. The group operates a dedicated Tor-based leak site where it publishes victim details, including sector, location, and sample stolen files, as part of its double-extortion strategy. Within its first month of activity, Frag claimed over two dozen victims, spanning industries such as manufacturing, aviation, real estate, retail, and legal services, with a global footprint including the United States, the Netherlands, and Singapore. Intrusion methods have included exploitation of known vulnerabilities—such as the Veeam Backup & Replication flaw CVE-2024-40711—and compromised remote access appliances. The group’s operations and targeting style suggest experienced actors, possibly with past involvement in other ransomware projects.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://xhvzsaxl3vbio6dg547envq5xgap3pwobtursdvwatdoxextv43kb7id.onion |
|
Frag Blog |
⬆️ |
2025-08-20 |
http://34o4m3f26ucyeddzpf53bksy76wd737nf2fytslovwd3viac3by5chad.onion/ |
Screen |
Frag Blog |
⬆️ |
2025-08-20 |
http://34o4m3f26ucyeddzpf53bksy76wd737nf2fytslovwd3viac3by5chad.onion/leaks/ |
Screen |
|
⬇️ |
2025-07-22 |
http://34o4m3f26ucyeddzpf53bksy76wd737nf2fytslovwd3viac3by5chad.onion/tada/posts/leaks?page=1 |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Free Civilian |
⬇️ |
2023-06-01 |
http://gcbejm2rcjftouqbxuhimj5oroouqcuxb2my4raxqa7efkz5bd5464id.onion/ |
Screen |
Description
FreeWorld is a ransomware variant first observed in September 2023, and is believed to be derived from the Mimic ransomware family. It is deployed through coordinated campaigns dubbed DB#JAMMER, which exploit poorly secured Microsoft SQL (MSSQL) servers exposed to the internet. Attackers gain initial access via brute force, leverage the xp_cmdshell feature to execute shell commands, disable defenses, deploy remote access tools like Cobalt Strike and AnyDesk, and eventually deliver the FreeWorld payload. The ransomware encrypts files using hybrid encryption and appends the .FreeWorldEncryption extension. Victims receive a ransom note titled FreeWorld-Contact.txt, directing them on payment and data recovery steps.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
This group is also known by their malware name, FLOCKER.
FSociety is a modern Ransomware-as-a-Service (RaaS) operation that emerged around 2024, named after the fictional hacking collective from Mr. Robot. It runs a double-extortion setup—encrypting victims’ data while simultaneously threatening to leak stolen files via a Tor-hosted portal. Organized campaigns suggest collaborative operations with other cybercrime actors, marking it as a part of a growing ransomware cartel ecosystem.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
𝐅𝐒𝐎𝐂𝐈𝐄𝐓𝐘 | 𝐅𝐋𝐎𝐂𝐊𝐄𝐑 |
⬇️ |
2025-08-18 |
http://flock4cvoeqm4c62gyohvmncx6ck2e7ugvyqgyxqtrumklhd5ptwzpqd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Home |
⬇️ |
2024-07-12 |
http://hkk62og3s2tce2gipcdxg3m27z4b62mrmml6ugctzdxs25o26q3a4mid.onion/ |
Screen |
Description
FTCode is a ransomware family first observed in 2013 as a PowerShell-based threat and later resurfaced in September 2019 with enhanced capabilities. It is notable for being fileless, executing entirely in memory using PowerShell scripts, which allows it to evade traditional antivirus detection. FTCode is commonly delivered via malicious email campaigns, often using phishing attachments such as Word documents with embedded macros that execute the ransomware script. It encrypts files using the AES algorithm and appends the .FTCODE extension, leaving ransom notes instructing victims to contact the operators via email. Later variants added capabilities such as stealing credentials from browsers and email clients. FTCode campaigns have been observed globally, with a focus on Europe, particularly Italy.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://qvo5sd7p5yazwbrgioky7rdu4vslxrcaeruhjr7ztn3t2pihp56ewlqd.onion/ |
|
Description
Funksec, a double extortion ransomware group, emerged in late 2024 and quickly gained notoriety by breaching databases and selling access to 15 government websites within just a month. Claiming to be entirely self-taught and operating without collaboration from other groups, Funksec is a four-member team driven primarily by financial motives.
The group leverages AI for specific tasks, such as creating tools and phishing templates, though they emphasize that AI contributes to only about 20% of their operations. Notably, they have developed their own proprietary AI tool, WormGPT, a desktop application built entirely in-house.
To enhance their phishing campaigns, Funksec uses premium services like PhishingBox to create customized phishing templates, adding another layer of precision and sophistication to their methods.
After the interview, during some casual chit-chat, it came to light that the owner of Funksec was also behind an underground forum called DarkZone, which had been built in collaboration with GhostSec in the past.
https://osint10x.com/threat-actor-interview-spotlighting-on-funksec-ransomware-group/
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Funksec |
⬇️ |
2024-12-30 |
http://7ixfdvqb4eaju5lzj4gg76kwlrxg4ugqpuog5oqkkmgfyn33h527oyyd.onion/ |
Screen |
Funksec |
⬇️ |
2024-12-28 |
http://pke2vht5jdeninupk7i2thcfvxegsue6oraswpka35breuj7xxz2erid.onion/ |
Screen |
Funksec |
⬇️ |
2024-12-06 |
http://ykqjcrptcai76ru5u7jhvspkeizfsvpgovton4jmreawj4zdwe4qnlid.onion/ |
Screen |
New Address Blog |
⬆️ |
2025-08-20 |
http://funknqn44slwmgwgnewne6bintbooauwkaupik4yrlgtycew3ergraid.onion/ |
Screen |
New Address Blog |
⬆️ |
2025-08-20 |
http://funkxxkovrk7ctnggbjnthdajav4ggex53k6m2x3esjwlxrkb3qiztid.onion/ |
Screen |
New Address Blog |
⬇️ |
2025-08-20 |
http://funkiydk7c6j3vvck5zk2giml2u746fa5irwalw2kjem6tvofji7rwid.onion/ |
Screen |
Funkforum |
⬇️ |
2025-03-20 |
http://funk4ph7igelwpgadmus4n4moyhh22cib723hllneen7g2qkklml4sqd.onion/ |
Screen |
Marketplace - Home Page |
⬇️ |
2025-01-29 |
http://funkyiazgfsrxrib6rnxbhkgfqi7isisfbqnwk2ycf7tpgfhtevlamad.onion/ |
Screen |
Anon Hosting - Hidden Services |
⬇️ |
2025-06-05 |
http://funksec.top/ |
Screen |
Funksec v3.0 |
⬇️ |
2025-04-13 |
http://funksec53xh7j5t6ysgwnaidj5vkh3aqajanplix533kwxdz3qrwugid.onion/ |
Screen |
Funksec v3.0 |
⬇️ |
2025-04-13 |
http://funksecsekgasgjqlzzkmcnutrrrafavpszijoilbd6z3dkbzvqu43id.onion/ |
Screen |
Funksec v3.0 |
⬇️ |
2025-04-13 |
http://funksec7vgdojepkipvhfpul3bvsxzyxn66ogp7q4pptvujxtpyjttad.onion/ |
Screen |
Contact Form - FunkLocker Support |
⬇️ |
2025-03-20 |
http://funk45xqgrkrtej4743evcgv65oi3w4shwvjx3cvrdtqwul7gzkxuxqd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
GandCrab was a prolific Ransomware-as-a-Service (RaaS) operation active from January 2018 to mid-2019. It quickly became one of the most widespread ransomware families due to its affiliate-based distribution model, where operators provided the ransomware to partners in exchange for a revenue share (reportedly 30–40%). GandCrab used a double-extortion approach in later stages, encrypting files with a combination of Salsa20 and RSA-2048 algorithms and appending extensions that varied by version (e.g., .GDCB, .KRAB, .CRAB). Initial access vectors included phishing emails with malicious attachments, exploit kits (notably RIG and GrandSoft), and remote desktop protocol (RDP) attacks. GandCrab’s operators claimed to have earned over $150 million before publicly announcing their retirement in June 2019, after which decryption keys for all versions were released.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://gandcrabmfe6mnef.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Our team members are from different countries and we are not interested in anything else, we are only interested in dollars.
We do not allow CIS, Cuba, North Korea and China to be targeted.
Re-attacks are not allowed for target companies that have already made payments.
We do not allow non-profit hospitals and some non-profit organizations be targeted.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
GD LockerSec | Home |
⬇️ |
2025-01-27 |
http://igziys7pres4644kbrtakxfbrwkyld64nxk5prpkgtcexwrrjgtfjzyd.onion |
Screen |
Description
aka Cring / Ghost (Cring)
Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.
Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Now a RaaS by BlackLock ($$$).
Global Group is a newly emerged Ransomware-as-a-Service (RaaS) platform that debuted in June 2025 on the Ramp4u cybercrime forum. Marketed as a successor to the Mamona and BlackLock ransomware families, it leverages a Golang-based, cross-platform payload that supports execution on Windows, macOS, and Linux. This group stands out by incorporating AI-driven chatbots to manage victim negotiations, promoting scalability and efficiency—even for affiliates lacking language skills. Within its first weeks of operation, Global Group claimed numerous victims across industries such as healthcare, automotive services, and facilities management, located in the U.S., U.K., Australia, and Brazil.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
GLOBAL | Blog |
⬆️ |
2025-08-20 |
http://vg6xwkmfyirv3l6qtqus7jykcuvgx6imegb73hqny2avxccnmqt5m2id.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion/ |
Screen |
GLOBAL | Client Portal |
⬆️ |
2025-08-20 |
http://gdbkvfe6g3whrzkdlbytksygk45zwgmnzh5i2xmqyo3mrpipysjagqyd.onion/ |
Screen |
GLOBAL | FileShare |
⬆️ |
2025-08-20 |
http://7bmz2tc4p2jk23dcyehg37cd7veflk3fyhxrnbxz75vvno2azfy6qayd.onion/ |
Screen |
Description
Globe is a ransomware family that first appeared in August 2016, notable for its highly customizable codebase that allows operators to configure ransom note text, encryption algorithms, and file extensions. Globe uses symmetric encryption (RC4 or AES) to lock files and typically appends custom extensions such as .GLOBE, .PURPLE, .HNY, or others set by the attacker. The malware is distributed through malicious spam emails with infected attachments, compromised websites, and exploit kits. Globe’s flexibility made it attractive to low-skilled actors, resulting in many different variants in the wild. The family has primarily targeted small to medium-sized businesses and individual users across multiple regions, with no clear geographic focus.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
GlobeImposter is a ransomware family that first appeared in mid-2017, designed to mimic the appearance and naming conventions of the earlier Globe ransomware but built on entirely different code. It uses strong encryption algorithms, typically AES combined with RSA, and appends a variety of file extensions to encrypted data—such as .crypt, .doc, .png, .jpg, .spreadsheet, and many more—depending on the campaign. GlobeImposter is primarily distributed via malicious spam campaigns with infected attachments, compromised RDP services, and exploit kits. It drops a ransom note (often named how_to_back_files.html or similar) instructing victims to contact the attackers via email. Over the years, GlobeImposter has spawned hundreds of variants, making it one of the more persistent commodity ransomware threats targeting small businesses and individuals globally.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Good Day is a ransomware variant within the ARCrypter family, first observed in May 2023. It gained prominence due to its reticent financial extortion model and custom branding—victims are greeted with a “Good day” message upon landing on individualized Tor-based victim portals. The malware is typically delivered via phishing campaigns disguising payloads as legitimate Windows updates. It utilizes a robust encryption workflow, including deletion of volume shadow copies and process evasion mechanisms. Notably, Good Day has been linked to the Cloak ransomware group through shared data leak infrastructure and overlapping leak portal behaviors.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://47h4pwve4scndaneljfnxdhzoulgsyfzbgayyonbwztfz74gsdprz5qd.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Home - Grep Hub |
⬇️ |
2025-08-20 |
http://grep3ql4yhlmpq5zy3en5bvenvfhrpzb6bgnkxeyse6basc7x4sqhgqd.onion/ |
Screen |
Description
Grief, also known as Pay or Grief, is a ransomware group that emerged in May 2021 and is widely believed to be operated by actors linked to the Evil Corp cybercrime syndicate. It operates as a Ransomware-as-a-Service (RaaS) platform, using a double-extortion strategy: encrypting files while threatening to leak stolen data via its Tor-based leak site. Grief’s ransomware payload uses strong encryption (commonly RSA-2048 + AES-256) and typically appends the .grief extension to files. The group has targeted organizations across multiple sectors, including government, finance, education, and manufacturing, with a focus on U.S. and European entities. Grief has been associated with infrastructure and code overlaps from the earlier DoppelPaymer ransomware and uses phishing emails, malicious attachments, and compromised RDP credentials for intrusion. In late 2021, the U.S. Treasury’s OFAC issued sanctions against Grief due to its ties with Evil Corp, making ransom payments to the group legally risky for victims in the U.S.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Grief list |
⬇️ |
2022-05-02 |
http://griefcameifmv4hfr3auozmovz5yi6m3h3dwbuqw7baomfxoxz4qteid.onion/ |
|
|
⬇️ |
Never |
http://payorgz3j6hs2gj66nk6omfw65atgmqwzxqbbxnqi3bv2mlwgcirunad.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Groove was a short-lived ransomware group and cybercrime gang that emerged in August 2021 and became notable for its aggressive, publicity-driven tactics. Unlike traditional Ransomware-as-a-Service (RaaS) groups, Groove functioned more as a loose criminal collective, encouraging other threat actors to join forces in attacking U.S. entities, particularly in the government and financial sectors. The group ran a Tor-based leak site where it published stolen data, but its operators claimed to focus more on building an “underground alliance” than on ransomware deployment itself. Analysts noted overlaps between Groove and actors behind Babuk and BlackMatter, as well as forum personas known for data theft operations. By early 2022, Groove’s activity had largely ceased, with some experts suggesting the group was either a short-term recruitment campaign or a misinformation effort.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Утечки | Groove |
⬇️ |
2021-10-30 |
http://ws3dh6av66sjbxxkjpw5ao3wqzmtejnkzheswm4dz5rrwvular7xvkqd.onion/ |
|
Description
Gunra is an emerging ransomware group first identified in April 2025. It employs a classic double-extortion model—encrypting sensitive data and exfiltrating it for publication via a Tor-hosted leak site. Since its emergence, Gunra has struck a diverse set of global targets—reportedly spanning sectors like manufacturing, healthcare, IT, real estate, agriculture, and consulting in countries including Brazil, Japan, Canada, Turkey, South Korea, Taiwan, Egypt, and the U.S.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Public Data Share |
⬇️ |
2025-08-20 |
http://gunrabxbig445sjqa535uaymzerj6fp4nwc6ngc2xughf2pedjdhk4ad.onion/ |
Screen |
Error |
⬇️ |
2025-05-14 |
http://2bw7r32r5eshwk2h7uekj3lwzorxds2jyhyzqyilphid3r27x5hsf4yd.onion |
Screen |
Private Chat with US |
⬇️ |
2025-08-19 |
http://jzbhtsuwysslrzi2n5is3gmzsyh6ayhm7jt3xowldhk7rej4dqqubxqd.onion/ |
Screen |
|
⬇️ |
Never |
http://vrlgjxbl6yroq26xkcjpafgmmxrlpawvr4agppna6apfxjxav2mq66ad.onion |
|
Description
Gwisin is a targeted ransomware group first publicly reported in July 2022, believed to operate primarily within South Korea. The group’s name means “ghost” in Korean, reflecting its stealthy approach. Gwisin has been observed conducting attacks on critical sectors, including healthcare, pharmaceutical, and manufacturing industries. It uses custom-built payloads tailored for each victim, capable of encrypting both Windows and Linux/VMware ESXi environments, and often executes attacks during national holidays to maximize operational disruption. Gwisin employs a double-extortion model—exfiltrating sensitive data before encryption—and communicates with victims in Korean-language ransom notes. Initial access vectors are not fully confirmed in open-source reporting, but suspected methods include exploiting vulnerable VPN appliances and leveraging stolen administrative credentials. The group is known for extensive pre-encryption reconnaissance to identify high-value systems and backups.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://gwisin4yznpdtzq424i3la6oqy5evublod4zbhddzuxcnr34kgfokwad.onion/ |
|
Description
Hades is a ransomware group first observed in December 2020, believed by several threat intelligence firms to be operated by, or closely linked to, the Evil Corp cybercrime syndicate. The group has primarily targeted large enterprises in the United States, Canada, and Germany, conducting big-game hunting operations. Hades is not known to operate as an open Ransomware-as-a-Service (RaaS) platform; instead, attacks appear to be conducted by the core operators. It uses a double-extortion model, encrypting systems and threatening to leak stolen data via a Tor-based portal. The ransomware payload is typically deployed after extensive network reconnaissance and lateral movement, often through compromised VPN credentials and exploitation of exposed services. Encrypted files are appended with the .hades extension, and ransom notes direct victims to unique Tor portals for negotiation. Notable sectors affected include manufacturing, transportation, and consumer goods.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://ixltdyumdlthrtgx.onion |
|
|
⬇️ |
Never |
http://m6s6axasulxjkhzh.onion/ |
|
Description
Handala (also known as Handala Hack Team, Hatef, Hamsa) is a pro-Palestinian hacktivist group first observed in December 2023. Its operations focus on politically motivated cyber campaigns targeting Israeli entities and organizations associated with Israel globally. Handala employs destructive tactics—primarily using multi-stage wiper malware that affects both Windows and Linux systems—alongside data theft and public exposure through leak sites. They are also known for orchestrating phishing campaigns that masquerade as legitimate alerts (e.g., spoofing CrowdStrike), followed by disabling defenses, injection via AutoIT or Delphi loaders, and destructive payload deployment.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2025-05-27 |
https://handala.to/ |
Screen |
Handala Hack Team – Free Palestine |
⬆️ |
2025-08-20 |
http://handala-hack.to |
Screen |
Handala Hack Team – Free Palestine |
⬆️ |
2025-08-20 |
http://vmjfieomxhnfjba57sd6jjws2ogvowjgxhhfglsikqvvrnrajbmpxqqd.onion |
Screen |
Description
Haron is a ransomware group that emerged in July 2021 and is believed to share operational similarities with the Avaddon ransomware, which shut down the month prior. Haron uses a double-extortion model—encrypting victims’ data and threatening to publish stolen files on a Tor-based leak site. The ransomware is written in C# and uses the Salsa20 encryption algorithm with RSA-1024 for key protection. File extensions are typically not changed during encryption, but ransom notes named HOW TO RESTORE YOUR FILES.txt are dropped across affected systems. Initial access methods are not comprehensively documented in public sources but may include phishing campaigns and exploitation of exposed RDP services. Haron’s leak site and negotiation structure closely resemble Avaddon’s, suggesting either code reuse or a shared affiliate network.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Clients page |
⬇️ |
2022-01-31 |
http://ft4zr2jzlqoyob7yg4fcpwyt37hox3ajajqnfkdvbfrkjioyunmqnpad.onion/login.php |
|
Info |
⬇️ |
2022-04-15 |
http://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad.onion/blog.php |
|
Description
HellCat is a relatively recent ransomware group first observed in late 2024, known for its data-theft and extortion campaigns targeting high-profile organizations. It operates a double-extortion model, exfiltrating sensitive information and threatening to publish it on its Tor-based leak site if ransom demands are not met. The group has been linked to multiple significant breaches, including incidents involving Schneider Electric and Capgemini, where large volumes of corporate data were allegedly stolen. HellCat’s payloads and leak infrastructure suggest a custom-built platform rather than a widely shared RaaS, and some incidents have involved only data exposure without confirmed encryption events. The group has drawn attention for recruiting or collaborating with high-profile threat actors, including the persona “Grep,” who acts as a public representative in some extortion cases.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Redirect to Mirror |
⬇️ |
2025-07-15 |
http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion |
Screen |
Index of / |
⬇️ |
2024-12-28 |
http://r7i4vprxr2vznmhnnxj36264ofwx6extopdz535f5v357nqacifymbad.onion/ |
Screen |
Just a moment... |
⬆️ |
2025-08-20 |
http://hellcat.rw |
Screen |
HELLCAT | Files |
⬆️ |
2025-08-20 |
http://hcatxn4ppkgmakaatrq6bsbhqk5ouhviygyx57gljjt5iseul5nvpayd.onion |
Screen |
404 Not Found |
⬇️ |
2025-07-15 |
http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion/api2.php?action=victims |
Screen |
Description
Helldown is an emerging ransomware group first identified in August 2024, known for its fast-evolving and cross-platform threat capabilities. It exploits critical vulnerabilities—most notably CVE-2024-42057 in Zyxel firewalls—for initial access and demonstrates modular design and anti-detection mechanisms. Helldown targets both Windows and Linux environments, including VMware and ESXi systems. It employs a double-extortion strategy: encrypting files with randomized extensions via executables like hellenc.exe, and threatening victims with data dump releases via its Tor-hosted leak site.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Helldown Leaks |
⬇️ |
2024-08-25 |
http://onyxcgfg4pjevvp5h34zvhaj45kbft3dg5r33j5vu3nyp7xic3vrzvad.onion/ |
Screen |
Helldown Leaks |
⬇️ |
2024-11-21 |
http://onyxcym4mjilrsptk5uo2dhesbwntuban55mvww2olk5ygqafhu3i3yd.onion |
Screen |
www.helldown.org - ICANN Verification Needed | Namecheap.com |
⬆️ |
2025-08-20 |
http://www.helldown.org |
Screen |
|
⬇️ |
Never |
http://onyxcb44xvqra35m3lp3z26kf2pxrlbn64nbzvyvzjyc3uykzrwcjdid.onion |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
HelloGookie |
⬇️ |
2024-07-17 |
http://gookie256cvccntvenyxrvn7ht73bs6ss3oj2ocfkjt5y6vq6gfi2tad.onion/ |
Screen |
Description
HelloKitty is a ransomware family first observed in November 2020, named after a string found in its binary. It operates as a human-operated, big-game hunting ransomware, manually deployed after network intrusion and reconnaissance. HelloKitty uses a double-extortion model—encrypting files and threatening to leak stolen data on a Tor-based site. The malware encrypts files using AES-256 in CBC mode with RSA-2048 to protect keys, appending extensions such as .crypted or campaign-specific suffixes. Distribution typically occurs via compromised RDP credentials, phishing, or exploitation of known vulnerabilities. The group gained notoriety in February 2021 after attacking CD Projekt Red, the developer of The Witcher and Cyberpunk 2077, stealing source code for several games. Subsequent variants have targeted both Windows and Linux systems, including ESXi servers.
Links
Page title |
Available |
Last visit |
URL |
Screen |
News |
⬇️ |
2021-10-02 |
http://3r6n77mpe737w4sbxxxrpc5phbluv6xhtdl5ujpnlvmck5tc7blq2rqd.onion |
|
|
⬇️ |
Never |
http://gunyhng6pabzcurl7ipx2pbmjxpvqnu6mxf2h3vdeenam34inj4ndryd.onion/ |
|
Description
Help_restoremydata is a ransomware variant identified around late 2024/early 2025, notable for appending the .help_restoremydata extension to encrypted files. It changes the victim’s desktop wallpaper and drops a ransom note titled HOW_TO_RECOVERY_FILES.html to instruct victims on how to pay for decryption. Initial discovery appears to stem from underground forum monitoring and threat intelligence assessments, marking it as emerging but not widely distributed. Technical details beyond these behaviors—such as encryption algorithms or distribution mechanisms—have not been documented in major cybersecurity advisories.
.help_restoremydata
ext : .help_restoremydata
note : HOW_TO_RECOVERY_FILES.html
Links
Page title |
Available |
Last visit |
URL |
Screen |
Enter your ID |
⬇️ |
2025-01-27 |
http://gzdn6yjvmrujiqzz4wwuykrta7jtkv2fupb7aozwx7yxnxhj737v2qad.onion/ |
Screen |
Description
Hermes is a ransomware family first observed in the wild in February 2017, believed to have been developed by a group operating out of Asia. It originally appeared as a Ransomware-as-a-Service (RaaS) offering on underground forums but later saw deployment in targeted attacks. Hermes uses AES-256 encryption to lock victim files and appends a variety of extensions (including .hrm and campaign-specific variants). The ransom note, often named DECRYPT_INFORMATION.html or DECRYPT_INFORMATION.txt, provides payment instructions via email. The ransomware gained notoriety in 2018 when it was used as a destructive wiper in the Far Eastern International Bank (FEIB) heist in Taiwan, where attackers deployed Hermes to cover their tracks after a SWIFT fraud operation. Over time, Hermes code has been re-used and integrated into other ransomware families, including some Ryuk builds, suggesting code sharing or purchase from the original developer. Distribution vectors have included phishing campaigns, malicious attachments, and exploitation of RDP services.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://ohu6eschnuhxfg46wvco7j3e76oqymo4cowfepbi7h6z3vf6if6lj5yd.onion/ |
|
Description
Hive is a strain of ransomware that was first discovered in June 2021. Hive was designed to be used by Ransomware-as-a-service providers, to enable novice cyber-criminals to launch ransomware attacks on healthcare providers, energy providers, charities, and retailers across the globe.
In 2022 there was a switch from GoLang to Rust.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
This domain has been seized |
⬇️ |
2023-05-26 |
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ |
Screen |
This domain has been seized |
⬇️ |
2023-05-26 |
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion |
Screen |
This domain has been seized |
⬇️ |
2023-05-26 |
http://hiveapi4nyabjdfz2hxdsr7otrcv6zq6m4rk5i2w7j64lrtny4b7vjad.onion/v1/companies/disclosed |
Screen |
Description
HolyGhost is a ransomware group first publicly reported in July 2022, believed to be operated by a North Korean state-sponsored threat actor tracked as APT43 or Andariel, a subgroup of the Lazarus Group. The group has been active since at least June 2021, using a double-extortion model that combines encryption of victim files with threats to leak stolen data via a Tor site. Early HolyGhost variants (BTLC_C.exe) used a custom file extension .h0lyenc, while later builds added more robust encryption, obfuscation, and evasion capabilities. Targeted victims include small and medium-sized businesses in manufacturing, finance, education, and event planning, primarily in the United States, South Korea, Brazil, and India. Intrusion methods include exploitation of vulnerable public-facing applications, credential theft, and possibly the use of purchased access from other threat actors. Unlike purely criminal groups, HolyGhost is suspected of being leveraged for both revenue generation and strategic cyber operations in support of DPRK objectives.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://matmq3z3hiovia3voe2tix2x54sghc3tszj74xgdy4tqtypoycszqzqd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://homelandjustice.ru |
Screen |
Description
Hotarus is a ransomware and data extortion group first observed in March 2021, believed to be linked to threat actors of Latin American origin. The group has targeted entities in South America and the United States, including financial institutions, government agencies, and private companies. Hotarus is known for deploying both custom ransomware and publicly available tools, alongside stealing sensitive information for double-extortion purposes. The group has been observed exploiting vulnerable web services, using stolen credentials, and leveraging publicly available post-exploitation frameworks to gain persistence in victim networks. Encrypted files are typically appended with extensions such as .hotarus or campaign-specific identifiers, and ransom notes direct victims to communicate via encrypted email services. Notably, in some campaigns, Hotarus deployed data leak threats without encrypting files, focusing solely on exposure as a pressure tactic.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Hotarus Corp |
⬇️ |
2021-10-22 |
http://r6d636w47ncnaukrpvlhmtdbvbeltc6enfcuuow3jclpmyga7cz374qd.onion |
|
Description
Hunters International is a ransomware group first identified in October 2023, believed to have taken over or rebranded from the now-defunct Hive ransomware operation. Shortly after its emergence, security researchers found significant code overlaps with Hive, suggesting that Hunters International either acquired Hive’s source code or involved former Hive developers. The group operates a double-extortion model—encrypting victim data and threatening to leak it on a Tor-based site. It has targeted organizations worldwide across healthcare, manufacturing, education, and government sectors. The ransomware is written in Rust, supports both Windows and Linux/ESXi environments, and appends extensions such as .locked to encrypted files. Initial access is typically obtained via compromised RDP credentials, phishing campaigns, or vulnerabilities in exposed systems.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
HUNTERS INTERNATIONAL |
⬇️ |
2025-07-17 |
https://hunters55rdxciehoqzwv7vgyv6nt37tbwax2reroyzxhou7my5ejyid.onion |
Screen |
HUNTERS INTERNATIONAL |
⬇️ |
2025-07-17 |
https://hunters33mmcwww7ek7q5ndahul6nmzmrsumfs6aenicbqon6mxfiqyd.onion/login |
Screen |
Error |
⬇️ |
2024-09-24 |
https://huntersinternational.net |
Screen |
Срок регистрации домена истек |
⬇️ |
2025-05-26 |
http://huntersinternational.su |
Screen |
|
⬇️ |
Never |
http://hunters55wwmd25ycahnbn5xh45hvtwbmby6ly4p6qee5pughbyrajqd.onion |
|
|
⬇️ |
Never |
http://hunters33dootzzwybhxyh6xnmumopeoza6u4hkontdqu7awnhmix7ad.onion |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Leakage List |
⬇️ |
2022-08-24 |
http://kf6x3mjeqljqxjznaw65jixin7dpcunfxbbakwuitizytcpzn4iy5bad.onion/board/leak_list/ |
Screen |
Leakage List |
⬇️ |
2023-03-13 |
http://7kstc545azxeahkduxmefgwqkrrhq3mzohkzqvrv7aekob7z3iwkqvyd.onion/board/victim_list/ |
Screen |
None |
⬇️ |
Never |
http://nxx3cy6aee2s53v7v5pxrfv7crfssw7hmgejbj47cv6xuak3bgncllqd.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
IMN Crew# |
⬇️ |
2025-08-06 |
http://imncrewwfkbjkhr2oylerfm5qtbzfphhmpcfag43xc2kfgvluqtlgoid.onion/ |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
INC Ransom |
⬇️ |
2024-07-10 |
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion |
Screen |
Access Blocked |
⬇️ |
2024-04-03 |
http://incapt.blog/ |
Screen |
Error Response Page |
⬇️ |
2024-07-22 |
http://incapt.su/blog/leaks |
Screen |
Disclosures |
⬆️ |
2025-08-20 |
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures |
Screen |
None |
⬇️ |
Never |
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/ |
|
NULL |
⬆️ |
2025-08-20 |
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://incbacg6bfwtrlzwdbqc55gsfl763s3twdtwhp27dzuik6s6rwdcityd.onion |
Screen |
|
⬇️ |
2025-01-02 |
http://incbackend.top |
Screen |
None |
⬇️ |
Never |
http://incbackfgm7qa7sioq7r4tdunoaqsvzjg5i7w46bhqlfonwjgiemr7qd.onion |
|
None |
⬇️ |
Never |
http://incbackrlasjesgpfu5brktfjknbqoahe2hhmqfhasc5fb56mtukn4yd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http:// ransomyktqx2m3xg.onion/ |
|
Description
Insane is a relatively obscure ransomware family first reported in late 2021, with few confirmed incidents in public threat intelligence. It encrypts victim files using symmetric encryption (AES) combined with RSA for key protection and appends the .insane extension to affected files. The ransom note, typically named INSANE_README.txt, directs victims to contact the operators via email for decryption instructions. Based on limited reporting, Insane does not appear to operate as a Ransomware-as-a-Service (RaaS) platform; instead, it seems to be deployed by the core operators in targeted attacks. Initial access methods are not well-documented, but suspected vectors include phishing attachments and exploitation of exposed RDP services. The group’s small footprint in open-source intelligence suggests limited distribution or use in highly selective campaigns.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Going insane |
⬇️ |
2024-02-12 |
http://nv5lbsrr4rxmewzmpe25nnalowe4ga7ki6yfvit3wlpu7dfc36pyh4ad.onion/ |
Screen |
Going insane |
⬇️ |
2024-02-12 |
http://gfksiwpsqudibondm6o2ipxymaonehq3l26qpgqr3nh4jvcyayvogcid.onion/ |
Screen |
Inane Right |
⬇️ |
2024-02-12 |
http://gfksiwpsqudibondm6o2ipxymaonehq3l26qpgqr3nh4jvcyayvogcid.onion/Insane.html |
Screen |
Inane Right |
⬇️ |
2024-02-12 |
http://nv5lbsrr4rxmewzmpe25nnalowe4ga7ki6yfvit3wlpu7dfc36pyh4ad.onion/Insane.html |
Screen |
Going insane |
⬇️ |
2024-02-12 |
http://r2ad4ayrgpf7og673lhrw5oqyvqg4em2fpialk7l7gxkasvqkqow4qad.onion/ |
Screen |
Inane Right |
⬇️ |
2024-02-12 |
http://r2ad4ayrgpf7og673lhrw5oqyvqg4em2fpialk7l7gxkasvqkqow4qad.onion/Insane.html |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Interlock |
⬆️ |
2025-08-20 |
http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/ |
Screen |
Interlock |
⬆️ |
2025-08-20 |
http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/leaks.php |
Screen |
|
⬇️ |
2025-04-03 |
http://zmqolc6yrdgn24w7eaaf4pfm235x65zbeggr4byk7og3crhcwn7sqeyd.onion |
Screen |
|
⬇️ |
2025-04-03 |
http://4awnzgndu5u3bb6vne2vixizdftkc4mdlz45lnrhjgelzm5ujywxmuqd.onion/index.php?p= |
Screen |
|
⬇️ |
2025-04-03 |
http://hp4fxytyky26q3kpgqlhewhrazaag5wg4jsaiwxlv3lkd7r7rmsamqyd.onion/index.php?p= |
Screen |
|
⬆️ |
2025-08-20 |
http://soqdfmnocwg47ixineyzlhyem5tx3fju4hadydwob7fk4oyldxhju4ad.onion/index.php?p= |
Screen |
|
⬇️ |
2025-04-03 |
http://sya5wcoyib7rozq6cjrdmrrunucqehkuzxs6rkrkffukkn5urq6bv7yd.onion/index.php?p= |
Screen |
|
⬇️ |
2025-04-03 |
http://4ep4zkhqqg3kihqlbpsppld4qvg7c7llotilezqr6evbazqbmcwu6fyd.onion/index.php?p= |
Screen |
|
⬆️ |
2025-08-20 |
http://hsthebgwlp6xxnhgmvmgukyzxuyaqkx5uqncg56wib7byonddo5k6myd.onion/index.php?p= |
Screen |
|
⬇️ |
2025-04-03 |
http://z7yjie5fejolxvscc3lralybnhynajewnqinjfdasoqa2mt2ixjnelqd.onion/index.php?p= |
Screen |
Interlock |
⬆️ |
2025-08-20 |
http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/support/step.php |
Screen |
Index of / |
⬇️ |
2025-04-03 |
http://53pkw34sr5aohkkpg4w3nz4wpsqod5mxdqer3hijrz2btv2pe3vncgad.onion |
Screen |
|
⬇️ |
Never |
http://74yeft3x7wvqnscbzfdljnvnmflnlib2b6mhu6a3arc3vvpi4qbrt2qd.onion |
|
|
⬇️ |
Never |
http://7baltffgfltbjh26fd62h2ieeomdcpro44xwkdqipbn5dtuklgkigkyd.onion |
|
|
⬇️ |
2025-04-03 |
http://fkdhvlseh3xyeugsu54frnui62zjrfpeb2v5rm44b53iopcr3h4flxyd.onion |
Screen |
|
⬆️ |
2025-08-20 |
http://hmrr2zllzzxxrdqi5ktjflpga4skdnxm4wvzgkkl72apofvczmsno2ad.onion |
Screen |
Index of / |
⬇️ |
2025-04-03 |
http://hvhidyqcyj4dozqdxuongpcs2yffjs2ojhazrncqi5cr4hhx3ljopiqd.onion |
Screen |
404 Not Found |
⬇️ |
2025-04-03 |
http://sjd7ssbiptl62jktrwc5yffsh4llljx7hswfltnfkttq47gdjlpknxid.onion |
Screen |
|
⬇️ |
Never |
http://zmdmlidqqrxbkyqkqttbsbticjbofjs5uzwecqvdxfadvsjw7mp5kjyd.onion |
|
|
⬆️ |
2025-08-20 |
http://tyrvuuh5tvrvk4x6lfxrvgabqmzpnxehelmdqztu3vekujcknvl2ufad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://k5pmfzuqwxr2uhnskktjicbnzr633zejupe54yginljj3mgoysfwe4id.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://65bhkrfbqnfjgcsr7456luzjauw5nikuwxradlysivy5wbttjikdhxid.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://k6oor2g5bfvdxhxr2g6fczu3iqldbzyavydk56lh6z7ex7n7wqg4eryd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://tpwgxrocjvlonhrfjm4jx3dore2u4brxfj4ikt7iba36c23svthhf7ad.onion/ |
Screen |
|
⬇️ |
2025-03-12 |
http://7hhhjnxeps222bydmavgawgw5mzkdnduuzifpobycjwsdryix2szlnqd.onion/ |
Screen |
404 Not Found |
⬆️ |
2025-08-20 |
http://ljurl2gqwtgfqzk6pkz5ggtdrdrpzpzzkdvf4jhpkk33dnwkcsmdi4ad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://hhmbi4q4sy7m7oyfrpjkxparnrrwijna3ncucu3vwc24v7xhjvst7nqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://gmgcrvr2piu5wl7eh7vuw3cyrunksox5d4zhvdkgd3kbnwbgvrglkjad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://5mk7t3hpdjei4ezymeog3kfsjmfxghvwr5ekerdilitafolstou5vpid.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://gxtrbmin7uses7lo6ryg6zdik6pevsjhk42zzlos7dbwpsfrqd6osjad.onion/ |
Screen |
|
⬇️ |
2025-08-18 |
http://5f7erlowczufe5cntt37ljhibswckyyxj4wrtuepdyygvooozkqpciid.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://e762chqol5savlrfqljepxwtozrxxwarkuyhqps2n34tm3rliff4beqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://k5nuvkinhjd3nf75zb452xl5oxtdhg4hucmui5n72fou3frw6e25v5id.onion/ |
Screen |
|
⬇️ |
2025-08-19 |
http://ad7tx2oyln5g6yk7turvhjxhqvunfucuiq5iwzc5odlomft7tvysxvqd.onion/ |
Screen |
|
⬇️ |
2025-08-18 |
http://z6xr75yrgbry3a7zxc734sac2u6libikshm2j5tsbrh5geq7ilik3nad.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://xbgiykmt3v25qkspndphfdktiezfeesq6t45ewsrizid5s37ljgs25ad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://523gzulwswe5tfevqlrxvqqh2fxo2mwrs2irnjel4mtu7qodgdu2ccyd.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://yp7yctliltdy3mdrdd2lfvcjx2xgcxrbvycje47jn6fbceurgznnapqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://6mwjyc64rnkht3qc4bv7svpufmbvm3k73vekxgdlsbqzx5toueq3ndyd.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://ivaoowg6juugqyn4tfpt2ilmwx3ea47c6ijxwlvgvrc6pemuwdywn6yd.onion/ |
Screen |
|
⬇️ |
2025-07-09 |
http://5eyzyzb6boe4dud4pwcuyigd54k262xf53z6zqkxs6gyzcfhoj2utcqd.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://ernx4wj3gzhlqxhlrsrsfxe3hd275uny7w3yorhbgwp7jlsxv23rolqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://3zzis52fvjbhoo2i5gyrmoeofqdr3m45jyvltuamxzktt77grsuczxid.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://6476eeaclqfjhnlusdwcui7i5mqxmo6i4evxi7jhqxemx2s6rtucxead.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://cbmeu74emtvhqr7cwbq4aaui4qw4f2kui674fuoeowwd6oem33bzf7yd.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://iwdzb7nnphh2rffdygryptldmr5ip3lk6dejfwn6qlbtvyipqxzbwdyd.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://vdo2l4ujgxfcucbhnzdd4745sbbd2vnnkj4csyf5blds2qomguubx5yd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://gd2cx4zvobqui6ssbbroferiv6oxlqyyy447aqpp2socxvvdu5rooyid.onion/ |
Screen |
|
⬇️ |
2025-07-08 |
http://af2o3nw2txv3u2vfwntytytw73cgplcsaf7zccrg3xxcwzapu3sgydad.onion/ |
Screen |
|
⬇️ |
2025-07-09 |
http://key55aknlvgxs57kapodjw55ww23ryxbwfgwki5334gs5ok73wntdmyd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://5hiynrduugrjbzxluostnxmitaer62obvfyrfxnqkdeog2ejpxhzuqid.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://zdn5uv663oiffbrloxalsdl4v3lg73elrnuso47rbuavu6bmhqvd2wqd.onion/ |
Screen |
|
⬇️ |
2025-07-09 |
http://63dxcqyjooi55s2x25aqsvrykywmmaaoxj4kc23kdboyxyng2zqtkbyd.onion/ |
Screen |
|
⬇️ |
2025-07-09 |
http://rqkmahiz55v6bgogfgyni5h7v4sq3bgayycpa6u4c7if7kpvrylcrmad.onion/ |
Screen |
|
⬇️ |
2025-07-09 |
http://fe3klmmbb7upoybd45ayjkxebqxaxukleu2w56kgo67rcnrxlalrxdad.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://nz5rdh2alikmxiyojqx52yhzxdqfty3jwtvcybqajxrkbtsk36jy4aqd.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://u2qvcxl65guk4lxi2lyxq5zwlgnq7ojahihr4ipl7a3wcui6pvff7dyd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://lbqgjosup47uopyrlvbylzixcp7l5rsrxcdv3y4vy23cczcftsr6imad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://bt52afulf6zsk3xhzceam6ukipw2wrzpfsizlizdcootn5bc4ewzr7ad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://ir3oqafizlapipdyrebrfuk5bxd56zqjemljvfkeb42nzpxvkxwmqpqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://vdnoyjrxieoikuqu3rpathtejvgl4xc6laihepyoyhw7tmuyxxhtvrqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://xqcx7b57dd5vrqllokebwuvub4hk3viktn4lsgyt2bg67oujd42xolqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://dnyyuk3nevegj37tnv3xav57c5twomc7uqsfbjlkwto3p4spzfop47qd.onion/ |
Screen |
|
⬇️ |
2025-08-20 |
http://c4xaaynebochyp6ccvxi2bzbvncosdhqcb65cjuqwgqcljlul5gbrhyd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Home | J Blog |
⬆️ |
2025-08-20 |
http://twniiyed6mydtbe64i5mdl56nihl7atfaqtpww6gqyaiohgc75apzpad.onion/ |
Screen |
J |
⬆️ |
2025-08-20 |
http://w4d5aqmdxkcsc2xwcz7w7jo6wdmvmakgy3y6mfmdtzmyvxe77cjkfbad.onion/ |
Screen |
torrents |
⬇️ |
2025-08-20 |
https://share.jtor.xyz/torrents/ |
Screen |
Description
Jaff is a ransomware family first discovered in May 2017, notable for its distribution via large-scale spam campaigns operated by the Necurs botnet. These campaigns delivered malicious PDF attachments that contained embedded Word documents with macros, which, when enabled, downloaded the ransomware payload. Jaff encrypts victim files using RSA and AES encryption and appends extensions such as .jaff, .wlu, or .sVn depending on the variant. The ransom note, typically named ReadMe.html or ReadMe.bmp, directs victims to a payment site hosted on the Tor network. The ransomware demands payment in Bitcoin and displays a custom payment portal interface. Jaff was initially believed to be linked to the Locky ransomware operators due to similarities in distribution methods, ransom portal design, and its use of Necurs, though later analysis suggested it was operated by a separate group. Its activity was short-lived, with most campaigns ceasing within weeks of its discovery.
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://rktazuzi7hbln7sy.onion/ |
|
Description
Jigsaw is a ransomware family first observed in April 2016, notorious for its psychological intimidation tactics. It encrypts files using AES encryption and appends various extensions (e.g., .fun, .kkk, .btc) depending on the variant. The ransomware’s ransom note features imagery of the “Billy” puppet from the Saw movie franchise and displays a countdown timer. Jigsaw is unique in that it deletes a portion of the victim’s files every hour until the ransom is paid, escalating the number of deletions over time to increase pressure. The note typically instructs victims to pay in Bitcoin via email communication. The malware is written in .NET, and numerous versions have circulated since its emergence, many of which are decryptable due to coding flaws. Jigsaw has mainly been spread via malicious email attachments and exploit kits. While it had a period of high activity in 2016–2017, most modern antivirus tools can easily detect and block it.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://jos666vxenlqp4xpnsxehovnaumi4c3q4bmvhpgdyz7bsk3ho3caokad.onion/ |
|
Description
JSWorm is a ransomware family that first appeared in May 2019 and is notable for undergoing multiple rebrands and evolutions, later appearing under names such as Nemty, Nefilim, Offwhite, Fusion, and Milihpen. Initially, it was distributed via malicious spam emails containing JavaScript files, hence the “JS” in its name. Later versions moved to targeted intrusions, leveraging compromised RDP services and vulnerable network appliances for initial access. JSWorm encrypts files using AES-256 encryption with RSA-2048 for key protection and appends campaign-specific extensions (e.g., .JSWORM, .Nemty, .Nephilim). The group adopted a double-extortion model in its later stages, stealing data before encryption and threatening to leak it via Tor-hosted sites. Its victimology spans various sectors worldwide, including manufacturing, energy, healthcare, and professional services. The continuous rebranding suggests an effort to evade detection, disrupt attribution, and maintain pressure on victims.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Just a moment... |
⬆️ |
2025-08-20 |
https://justice-blade.io |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Stolen data |
⬆️ |
2025-08-20 |
http://nerqnacjmdy3obvevyol7qhazkwkv57dwqvye5v46k5bcujtfa6sduad.onion |
Screen |
403 Forbidden |
⬇️ |
2025-02-06 |
http://dwgxeoaqykd3zdkhol5xpgsqabp4lys4ea7qpl3f2b75b2sdsex644id.onion/files/ |
Screen |
404 Not Found |
⬇️ |
2025-05-27 |
http://dngqgtcqcz5hgjvk4encs4vfyzucx3gtmov5a4eltvovux4nvazbx6ad.onion/files/ |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http://usqa5b33yyc2u6kqf5au64cgj64acl2umtll76qutlmu7fckw6kh6wqd.onion/files/ |
Screen |
Files |
⬇️ |
2025-08-02 |
http://esmhbczpio7umfnxog6bk23q3nok5fjuik2dttegvezqngg2oqklo7yd.onion/ |
Screen |
Files |
⬇️ |
2025-07-25 |
http://2msn5sp3af3iy2ozj4235ccsb7pnpp4tkzyxdpzutyc2sxb3mujicfyd.onion/ |
Screen |
None |
⬇️ |
Never |
http://pj6dzqat4n4hwb625a4qjpuzd3bzrjgw5zlwa3l6uiazdwjcib3y6ad.onion/ |
|
title – Just another WordPress site |
⬆️ |
2025-08-20 |
http://vpj6dzqat4n4hwb625a4qjpuzd3bzrjgw5zlwa3l6uiazdwjcib3y6ad.onion/ |
Screen |
Description
Karakurt is a financially motivated cybercrime group first publicly identified in June 2021, specializing in data extortion without file encryption. Instead of deploying ransomware to lock systems, Karakurt focuses on gaining access to victim networks, exfiltrating sensitive data, and threatening to leak it on its Tor-based site unless payment is made. The group has targeted victims across North America and Europe in industries including healthcare, manufacturing, education, and professional services. Intrusion methods include phishing, exploitation of vulnerabilities, and purchasing access from initial access brokers. Karakurt’s leak site lists stolen files in stages to pressure victims, sometimes publishing entire data sets if ransoms are not paid. The group is believed to have operational links to the Conti ransomware syndicate, based on shared infrastructure, overlapping victimology, and timing of activity.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Magazine |
⬇️ |
2024-08-02 |
https://3f7nxkjway3d223j27lyad7v5cgmyaifesycvmwq7i7cbs23lb6llryd.onion/ |
Screen |
|
⬇️ |
2023-06-16 |
https://www.karanews.live |
Screen |
|
⬇️ |
2023-06-16 |
https://www.karanews.live |
Screen |
403 Forbidden |
⬇️ |
2025-03-29 |
https://karakurt.tech |
Screen |
|
⬆️ |
2025-08-20 |
https://karaleaks.com |
Screen |
|
⬇️ |
Never |
https://omx5iqrdbsoitf3q4xexrqw5r5tfw7vp3vl3li3lfo7saabxazshnead.onion/ |
|
|
⬇️ |
Never |
http://53dxw3yoeirahqn263a7ihzv2hhsjzdgvwqxdcuujlsrctmqzsph6tid.onion |
|
|
⬇️ |
Never |
http://jo7jezin3bmprlivyleqfv7rq3j4m36hd7bf2bguabxf2rlyrvrjwhad.onion |
|
|
⬇️ |
Never |
http://nrulhk2lbzt7jw6tnsq6gkjrn37j7uwfu5oxbuxezgherhuhakl2tqid.onion |
|
|
⬇️ |
Never |
https://t5sb509msc3q4ls06o1g8e4egfxl1o7e79yvlldakfphc0nf7rwiyphv.onion |
|
Description
Karma is a ransomware group first observed in November 2021, operating a double-extortion model that combines data theft with encryption. The group primarily targets enterprises across various sectors, including healthcare, manufacturing, and technology, with confirmed victims in North America, Europe, and Asia. Karma is believed to be a rebrand or evolution of the FiveHands ransomware, itself derived from the earlier HelloKitty codebase, based on overlaps in encryption methods and ransom portal design. The ransomware appends the .KARMA extension to encrypted files and leaves ransom notes named KARMA-README.txt, directing victims to a Tor-based negotiation site. Initial access is typically obtained through compromised VPN credentials, exploitation of vulnerabilities in public-facing systems, and use of access brokers. Unlike some groups, Karma operators claim to avoid encrypting systems in healthcare emergency services, instead focusing on exfiltration and extortion.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Karma Leaks |
⬇️ |
2021-11-05 |
http://3nvzqyo6l4wkrzumzu5aod7zbosq4ipgf7ifgj3hsvbcr5vcasordvqd.onion |
|
Description
Kasseika is a ransomware variant first publicly reported in January 2024, identified as a new evolution of the BlackMatter/LockBit ransomware codebase. The malware appends the .kasseika extension to encrypted files and uses a double-extortion model, combining file encryption with threats to publish stolen data on a Tor-based leak site. Early analysis revealed that Kasseika shares several traits with LockBit 3.0, including encryption routines, obfuscation methods, and ransom note structure, but with modified branding and negotiation portals. Initial access vectors have not been widely confirmed, though patterns from related ransomware suggest the use of compromised credentials, RDP exploitation, and vulnerabilities in public-facing services. Victims have been observed in North America, Europe, and Asia, spanning industries like manufacturing, logistics, and professional services.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Kawa4096 |
⬇️ |
2025-08-16 |
http://kawasa2qo7345dt7ogxmx7qmn6z2hnwaoi3h5aeosupozkddqwp6lqqd.onion |
Screen |
Description
Kelvin Security is a cybercrime group active since at least 2013, primarily known for hacktivism, data breaches, and website defacements rather than traditional ransomware operations. The group has claimed responsibility for intrusions targeting government agencies, educational institutions, and private companies across multiple regions, including Latin America, Europe, and the Middle East. While it has engaged in data theft and leak threats, there is no confirmed evidence that Kelvin Security operates a ransomware encryption component. Instead, their extortion model focuses on stealing sensitive data and threatening public disclosure, often publicizing breaches via social media and underground forums. The group’s activities have been linked to politically motivated campaigns as well as financially motivated breaches. Victim selection appears opportunistic, exploiting vulnerabilities in web servers, poorly configured databases, and exposed credentials.
Links
Page title |
Available |
Last visit |
URL |
Screen |
404 Error: Page Not Found | Wix.com |
⬆️ |
2025-08-20 |
https://kelvinsecteamcyber.wixsite.com/my-site/items |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
504 Gateway Time-out |
⬇️ |
2024-11-25 |
http://kill432ltnkqvaqntbalnsgojqqs2wz4lhnamrqjg66tq6fuvcztilyd.onion/ |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬆️ |
2025-08-20 |
http://ks5424y3wpr5zlug5c7i6svvxweinhbdcqcfnptkfcutrncfazzgz5id.onion/posts.php |
Screen |
|
⬆️ |
2025-08-20 |
http://ks5424y3wpr5zlug5c7i6svvxweinhbdcqcfnptkfcutrncfazzgz5id.onion |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://xo4o2o2ezgydykywn6zkyqx7toio6z5rzvmjyakgtgkk22vv7223jmqd.onion/ |
Screen |
Description
Knight is a Ransomware-as-a-Service (RaaS) operation first observed in August 2023, believed to be a rebrand or evolution of the Cyclops ransomware family. The ransomware targets both Windows and Linux/ESXi systems, encrypting files with strong symmetric and asymmetric cryptography and appending the .knight extension. Knight affiliates employ a double-extortion model, stealing sensitive data before encryption and threatening to leak it via a Tor-based site. Distribution methods include phishing campaigns delivering malicious attachments, exploitation of vulnerabilities in public-facing services, and use of previously compromised credentials. The ransomware is modular, allowing affiliates to deploy only the components needed for a given environment, and has been used in attacks on healthcare, manufacturing, finance, and technology sectors across North America, Europe, and Asia. Knight’s leak site lists victims with partial data dumps to pressure payment, escalating to full leaks if negotiations fail.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Blog |
⬇️ |
2024-02-14 |
http://knight3xppu263m7g4ag3xlit2qxpryjwueobh7vjdc3zrscqlfu3pqd.onion/ |
Screen |
|
⬇️ |
Never |
http://3r7zqtidvujbmfhx52sb34u4vwkh66baefmqzlbqpcnwm3krzipy37yd.onion/ |
|
|
⬇️ |
Never |
http://uzfrntnmwojla5v4w3xvpxerjg43kuzqxmtspqhi5qclwtof5ibgonyd.onion |
|
|
⬇️ |
Never |
http://r6chas4skrvna72fg5ui3cqkke4fnpinsskvlo57aiolrrdb3r777mqd.onion |
|
|
⬇️ |
Never |
http://vdyummkrwpjg5ufzefpsqlei5jgfulgci42fjraslavxeegsodei2tyd.onion |
|
|
⬇️ |
Never |
http://apem3txac4a74co33eceffd3yrfsufhebdzjc5zvjlie53wius2gbtyd.onion |
|
Description
Kraken leak blog (hellokitty)
Kraken is a ransomware family first observed in August 2018 as a Ransomware-as-a-Service (RaaS) operation promoted on underground forums. The malware encrypts files with AES encryption (keys protected with RSA) and appends the .kraken extension to encrypted files. Early versions distributed by affiliates were bundled with Azorult spyware, enabling credential and cryptocurrency wallet theft before encryption. Kraken’s operators enforced strict rules for affiliates, including geographic restrictions on attacks, and provided customizable ransom notes and payment portals. Victims were instructed to pay in Bitcoin via Tor-hosted sites. Distribution methods included malicious email attachments, compromised RDP services, and downloads from malicious or compromised websites. Although its activity declined significantly after late 2018, Kraken remains notable for its hybrid model of ransomware deployment combined with credential theft.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Kraken leak blog |
⬆️ |
2025-08-20 |
http://krakenccj3wr23452a4ibkbkuph4d6soyx2xgjoogtuamc3m7u7wemad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://zq3k4odlfpbzc5y4sxqgolivelxepceaakru3xqo4ll2czmvvtek2ryd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://t3uouzfvsaqurb2rzoe2mkpetp54d7lgtl45ply34v5lugsnzysmkhid.onion/ |
Screen |
|
⬇️ |
2025-07-11 |
http://xbupelqsy7lubogl6kdtdqguxoleehbxnuuqm2dos6bbmdwablpqckad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://mvr2bidstp52pkaybzccjueux4hqbkukuqiss6vhn72qwqruzc7awsid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://vmnnrqf3gs3kl2kfnxatughwmnlyq6qxzyx24ylyh2w36vw3gqwqjpqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ko3lwb6glib74kmol5ov5cphabwqmifb5lnjw4bvj75jpfigrfbn7gid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://wkqvktnmr2slazl76opbkdli4ia6gznhxln2z5wny54hf4kzjwgqvxyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://cjhuttkivmtrf6itrmyoqnxw55isy3dh6u5ifc3fnhajp7lwn5deflid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://3cxvgnwvbzzfm2abzxidi76uib53vsjudsavgzm4viaj26drkcdl6wad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ab2v4xzffr24pdmswqzrbg45pwsget4h7eyd4swxewuqbxmlwcju7lad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://fk5c3gxraixjl3p7zacchn4jvew35vxo5xpedqf2qtlynsheqymampid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://yjsknaecbmhvrsagrcwqelpojnbcllt6v27vxebxhnotd3wu67onc5qd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://kxntyq6yyfomjoqqya6px7pgc6mbfcbaejryxhiwpntcnlr7hopqj3yd.onion/ |
Screen |
|
⬇️ |
2025-08-11 |
http://2puszzzqvfv2eco7idbt2fznn2iwlsw27ns5xq3ad257mui2keakacqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ebcbyeua65jtsnbsqsjahurkfj6yndhcwnnfxvwwg4yegb5h7fxjc5ad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://2lqlecl4q4hkrb3rl5p27b4hptnz7lqaaux5uca3g6pylpqlhqyafvad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://74fwiwaeqvtuf6uddankq5pzq637zpput3qxzq36fcxkhltq5plcxdqd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Not Found - Krypt |
⬆️ |
2025-08-20 |
http://decryptjhpol6zezc72xb2mofmi6o7xlvacnrpbuiczz2sz5ljurg4id.onion/chat |
Screen |
Not Found - Krypt |
⬆️ |
2025-08-20 |
http://decryptrrx2fojgfcof3aesrklj5obq7nmizyokq7ohzqxtwfcvtmwad.onion/chat |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Kuiper is a relatively new ransomware strain first analyzed in April 2023, notable for being written in Rust and designed to target multiple platforms, including Windows, Linux, and ESXi environments. The ransomware encrypts files with ChaCha20 symmetric encryption, securing keys with Curve25519, and appends the .kuiper extension to affected files. Kuiper operates under a double-extortion model, exfiltrating data before encryption and threatening to leak it on a Tor-hosted site if the ransom is not paid. Initial infection vectors are not widely documented, but analysis suggests potential use of compromised credentials, phishing, or exploitation of exposed services. The ransomware contains evasion techniques such as process termination, shadow copy deletion, and targeting of backup files to hinder recovery. Public reporting on Kuiper remains limited, indicating it may be in an early operational stage or used by a small number of actors.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
La Piovra Ransomware |
⬇️ |
2024-07-11 |
http://et22fibzuzfyzgurm35sttm52qbzvdgzy5qhzy46a3gmkrrht3lec5ad.onion/ |
Screen |
La Piovra Ransomware – a new cartel |
⬇️ |
2024-07-11 |
http://h3txev6jev7rcm6p2qkxn2vctybi4dvochr3inymzgif53n2j2oqviqd.onion/ |
Screen |
La Piovra Ransomware - Members Only |
⬇️ |
2024-07-11 |
http://wx3djgl4cacl6y4x7r4e4mbqrrub24ectue7ixyix2du25nfowtvfiyd.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Live Support |
⬇️ |
2023-10-09 |
http://nn5ua7gc7jkllpoztymtfcu64yjm7znlsriq3a6v5kw7l6jvirnczyyd.onion |
Screen |
None |
⬇️ |
2021-05-01 |
http://krjv3wondknwdrlvzp6ktqcqkrlvpme2xjt3fu7ojqpaqgl3sm33bdqd.onion/ |
|
Description
Lapsus$ is a cyber extortion group first observed in late 2021, known for high-profile breaches and data theft campaigns against major global companies rather than traditional ransomware encryption. The group primarily focuses on data exfiltration and public leak threats without encrypting victim systems. Lapsus$ uses a combination of social engineering, SIM swapping, MFA fatigue attacks, and purchasing access from insiders or access brokers to infiltrate corporate networks. Their victim list includes Microsoft, Okta, NVIDIA, Samsung, Uber, and telecom operators, with operations targeting multiple regions worldwide. Once inside, Lapsus$ actors exfiltrate source code, proprietary data, and customer information, often leaking samples to pressure victims into negotiation. The group is known for a brash and public-facing style, communicating directly with followers on Telegram channels and occasionally mocking victims. Several members, including minors, have been arrested in the UK, but the group’s activities have persisted in some form.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Telegram: Contact @minsaudebr |
⬆️ |
2025-08-20 |
https://t.me/minsaudebr |
Screen |
Description
Affiliates:
@Mr.C
@Empathy
@jayze
@Widow
@Memory
Links
Page title |
Available |
Last visit |
URL |
Screen |
late.lol |
⬆️ |
2025-08-20 |
https://late.lol |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://lcryxdecryptor4f6xzyorj9qsb5e.onion |
|
None |
⬇️ |
Never |
http://lcryptordecrypt7xfzq5tclm9jzpwq72uofgy2znkdsxm54zbcu2yid.onion |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
LEAKED DATA |
⬇️ |
2025-08-20 |
http://business-data-leaks.com |
Screen |
Web Page Blocked |
⬇️ |
2025-08-03 |
http://ep6pheij.com/ |
Screen |
Description
In the cyber-undergrounds, we're exploring shadowed corridors of the digital world in search of inside information. we’re a digital watchdog operating at the intersection of cybersecurity, internet freedom, and investigative journalism. We delve into the hidden corners of the web, exposing truths and uncovering stories that are often buried by mainstream media or distorted by corporate interests.
This project isn’t just for tech experts or privacy advocates. It’s for everyone who values transparency, freedom, and integrity in a connected world. Operating independently, we’re free from corporate influence and political bias, enabling us to report with uncompromising honesty. Our work resonates with a diverse audience cybersecurity experts, digital rights activists, journalists, and anyone who values an internet free from control.
In a world where the lines between truth and agenda grow increasingly blurred, we’re building something bold, the space where the truth of the internet can be uncovered, untamed and unfiltered. Our project is an independent voice for digital freedom, committed to shining a light on the internet’s most vital and vulnerable spaces: cybersecurity, privacy, and the right to information without compromise.
In a landscape clouded by agendas and profit, we are here to do one thing: deliver the truth, boldly and beautifully. Join us as we push back against the systems that seek to compromise our digital freedoms and carve a path toward a more transparent, liberated internet.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
News Blog |
⬆️ |
2025-08-20 |
http://nleakk6sejx45jxtk7x6iyt65hwvfrkifc5v7ertdlwm3gttbpvlvxqd.onion/ |
Screen |
|
⬇️ |
Never |
http://ahic5qo3qbjgsyv7x2h5w7uh6nuh45km5srblj7i2amxt57xp4wud2qd.onion/ |
|
|
⬆️ |
2025-08-20 |
http://bnlluetsuf6pv7mchgue46h43v66uxtccpg3n5vcdzbeqften5cedlid.onion/ |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://yeuajcizwytgmrntijhxphs6wn5txp2prs6rpndafbsapek3zd4ubcid.onion/ |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Linkc Pub |
⬇️ |
2025-04-26 |
http://iywqjjaf2zioehzzauys3sktbcdmuzm2fsjkqsblnm7dt6axjfpoxwid.onion/ |
Screen |
|
⬇️ |
2025-04-26 |
http://xs4psqhvekjle3qwyiav7dzccuo4ylw2eylvd3peuqrld74kzzjzhcyd.onion/ |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://lockbitkodidilol.onion |
|
|
⬇️ |
Never |
http://lockbitks2tvnmwk.onion |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion/ |
Screen |
Start-maximized.com |
⬇️ |
2022-07-13 |
http://zqaflhty5hyziovsxgqvj2mrz5e5rs6oqxzb54zolccfnvtn5w2johad.onion |
|
Title |
⬇️ |
2024-10-16 |
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion |
Screen |
LockBit BLOG |
⬇️ |
2022-06-17 |
http://yq43odyrmzqvyezdindg2tokgogf3pn6bcdtvgczpz5a74tdxjbtk2yd.onion |
|
LockBit Anti-DDos protection |
⬇️ |
2022-06-17 |
http://oyarbnujct53bizjguvolxou3rmuda2vr72osyexngbdkhqebwrzsnad.onion |
|
LockBit BLOG |
⬇️ |
2022-06-17 |
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion |
|
It's better than Tinder! |
⬇️ |
2022-08-06 |
http://lockbitapt.uz |
|
LockBit BLOG |
⬇️ |
2022-06-17 |
http://yq43odyrmzqvyezdindg2tokgogf3pn6bcdtvgczpz5a74tdxjbtk2yd.onion |
|
LockBit BLOG |
⬇️ |
2022-06-17 |
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion |
|
Title |
⬇️ |
2024-10-16 |
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z2jwcskxpbokpemdxmltipntwlkmidcll2qirbu7ykg46eyd.onion |
Screen |
LockBit LOGIN |
⬇️ |
2024-02-19 |
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion |
Screen |
LockBit BLOG |
⬆️ |
2025-08-20 |
http://lockbit3753ekiocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2id.onion/ |
Screen |
LockBit BLOG |
⬇️ |
2025-08-19 |
http://lockbit3g3ohd3katajf6zaehxz4h4cnhmz5t735zpltywhwpc6oy3id.onion/ |
Screen |
LockBit BLOG |
⬆️ |
2025-08-20 |
http://lockbit3olp7oetlc4tl5zydnoluphh7fvdt5oa6arcp2757r7xkutid.onion |
Screen |
LockBit BLOG |
⬇️ |
2025-08-20 |
http://lockbit435xk3ki62yun7z5nhwz6jyjdp2c64j5vge536if2eny3gtid.onion |
Screen |
LockBit BLOG |
⬆️ |
2025-08-20 |
http://lockbit4lahhluquhoka3t4spqym2m3dhe66d6lr337glmnlgg2nndad.onion |
Screen |
LockBit BLOG |
⬆️ |
2025-08-20 |
http://lockbit6knrauo3qafoksvl742vieqbujxw7rd6ofzdtapjb4rrawqad.onion |
Screen |
LockBit BLOG |
⬇️ |
2025-08-19 |
http://lockbit7ouvrsdgtojeoj5hvu6bljqtghitekwpdy3b6y62ixtsu5jqd.onion |
Screen |
504 Gateway Time-out |
⬇️ |
2024-06-26 |
http://ofj3oaltwaf67qtd7oafk5r44upm6wkc2jurpsdyih2c7mbrbshuwayd.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbit23xxhej7swdop24cru7ks2w66pw7zgdkydqo6f7wfyfqo7oqd.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbit7ixelt7gn3ynrs3dgqtsom6x6sd2ope4di7bu6e6exyhazeyd.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitck6escin3p33v3f5uef3mr5fx335oyqon2uqoyxuraieuhiqd.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitfhzimjqx2v7p2vfu57fpdm5zh2vsbfk5jkjod3k5pszbek7ad.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbiti7ss2wzyizvyr2x46krnezl4xjeianvupnvazhbqtz32auqqd.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitkwkmhfb2zr3ngduaa6sd6munslzkbtqhn5ifmwqml4sl7znad.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitqfj7mmhrfa7lznj47ogknqanskj7hyk2vistn2ju5ufrhbpyd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z2mmiz3ryxafn5kapbvbbiywsxwovasfkgf5dqqp5kxlajad.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z2og4jlsmdy7dzty3g42eu3gh2sx2b6ywtvhrjtss7li4fyd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-20 |
http://lockbit7z355oalq4hiy5p7de64l6rsqutwlvydqje56uvevcc57r6qd.onion |
Screen |
LockBit - Leaked |
⬆️ |
2025-08-20 |
http://lockbit7z36ynytxwjzuoao46ck7b3753gpedary3qvuizn3iczhe4id.onion |
Screen |
LockBit - Leaked |
⬆️ |
2025-08-20 |
http://lockbit7z37ntefjdbjextn6tmdkry4j546ejnru5cejeguitiopvhad.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-18 |
http://lockbit7z3azdoxdpqxzliszutufbc2fldagztdu47xyucp25p4xtqad.onion |
Screen |
LockBit - Leaked |
⬆️ |
2025-08-20 |
http://lockbit7z3ddvg5vuez2vznt73ljqgwx5tnuqaa2ye7lns742yiv2zyd.onion |
Screen |
LockBit - Leaked |
⬆️ |
2025-08-20 |
http://lockbit7z3hv7ev5knxbrhsvv2mmu2rddwqizdz4vwfvxt5izrq6zqqd.onion |
Screen |
|
⬇️ |
Never |
http://ockbit7z3ujnkhxwahhjduh5me2updvzxewhhc5qvk2snxezoi5drad.onion |
|
LockBit - Leaked |
⬆️ |
2025-08-20 |
http://lockbit7z4bsm63m3dagp5xglyacr4z4bwytkvkkwtn6enmuo5fi5iyd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-18 |
http://lockbit7z4cgxvictidwfxpuiov4scdw34nxotmbdjyxpkvkg34mykyd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z4k5zer5fbqi2vdq5sx2vuggatwyqvoodrkhubxftyrvncid.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-18 |
http://lockbit7z4ndl6thsct34yd47jrzdkpnfg3acfvpacuccb45pnars2ad.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-20 |
http://lockbit7z55tuwaflw2c7torcryobdvhkcgvivhflyndyvcrexafssad.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-20 |
http://lockbit7z57mkicfkuq44j6yrpu5finwvjllczkkp2uvdedsdonjztyd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z5ehshj6gzpetw5kso3onts6ty7wrnneya5u4aj3vzkeoaqd.onion |
Screen |
LockBit - Leaked |
⬆️ |
2025-08-20 |
http://lockbit7z5hwf6ywfuzipoa42tjlmal3x5suuccngsamsgklww2xgyqd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-18 |
http://lockbit7z5ltrhzv46lsg447o3cx2637dloc3qt4ugd3gr2xdkkkeayd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z6choojah4ipvdpzzfzxxchjbecnmtn4povk6ifdvx2dpnid.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z6dqziutocr43onmvpth32njp4abfocfauk2belljjpobxyd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z6f3gu6rjvrysn5gjbsqj3hk3bvsg64ns6pjldqr2xhvhsyd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z6qinyhhmibvycu5kwmcvgrbpvtztkvvmdce5zwtucaeyrqd.onion |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-17 |
http://lockbit7z6rzyojiye437jp744d4uwtff7aq7df7gh2jvwqtv525c4yd.onion |
Screen |
|
⬇️ |
2025-07-07 |
http://lockbit5eevg7vec4vwwtzgkl4kulap6oxbic2ye4mnmlq6njnpc47qd.onion |
Screen |
|
⬇️ |
2025-07-07 |
http://lockbit74beza5z3e3so7qmjnvlgoemscp7wtp33xo7xv7f7xtlqbkqd.onion |
Screen |
|
⬇️ |
2025-07-07 |
http://lockbit75naln4yj44rg6ez6vjmdcrt7up4kxmmmuvilcg4ak3zihxid.onion |
Screen |
|
⬇️ |
2025-07-07 |
http://lockbit7a2g6ve7etbcy6iyizjnuleffz4szgmxaawcbfauluavi5jqd.onion |
Screen |
|
⬇️ |
2025-07-07 |
http://lockbitaa46gwjck2xzmi2xops6x4x3aqn6ez7yntitero2k7ae6yoyd.onion |
Screen |
|
⬇️ |
2025-07-07 |
http://lockbitb42tkml3ipianjbs6e33vhcshb7oxm2stubfvdzn3y2yqgbad.onion |
Screen |
|
⬇️ |
2025-07-07 |
http://lockbitcuo23q7qrymbk6dsp2sadltspjvjxgcyp4elbnbr6tcnwq7qd.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitffcjqi2wpwhjgubkjihhc7seaujqgzscvwvdiftunl6hn5oyd.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitehorki5kh6s3n27hi3serhzr7htlshfqyg5ex32dyr5efhfyd.onion |
Screen |
Humanity check |
⬇️ |
2024-12-02 |
http://lockbitdzjxsgyacnmfte6nfgqfcyhedkduimi4tsajvrwi4ljbos7id.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitdzjxsgyacnmfte6nfgqfcyhedkduimi4tsajvrwi4ljbos7id.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitbtdk33k75rsl6uhn6bewd5g6z3hp42z6vb2hfk54oja55h7id.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitb63zs7f4rdjcsn2etkqaswurk6hh55sa2ojeilxcnwf6qbkqd.onion |
Screen |
|
⬇️ |
Never |
http://lockbit7xn7nqc5f5gfhv6qrf46xh65lscuzctwnmomthcigu2m3tad.onion |
|
Humanity check |
⬇️ |
2025-07-07 |
http://lockbit7bb4b6n27feok2rc7ri75udaqkfppjvtkxlwh7qldygbopmad.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbit4r3ly63w22jhkg33emtqwxw436wkftosscvdal2prdlwzknyd.onion |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbit3hdu7e4sv3ecg6mmqmeihjcizebcxic6t4eqwar6f2e7rxpad.onion |
Screen |
|
⬆️ |
2025-08-20 |
http://lockbit3753ekiocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2id.onion/pgp.txt |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbb47q2f7nzeatj6mxppuk7bhnvwu23mf6pfuywxcz57dwnzl6z3ksqd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbb6ud2vyf23z4hw6fzskr5gru7eftbjfbd6yzra3hzuqqvjy63blqqd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbb2llze7ab4rnq4jumsy4ihsqzpuysaofpz2e43foocwmrzsokumqid.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbb5cnqexve2wg6acbfyohkzeijflpqmgijx5ksyvu4aljv27r2lgiid.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbchnkrhkjtltjunmqsbw32bbblsd5bd2pqywtt2bex4bjmo5ry2iqd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbellr6aq4kuchzy44pmimszfd4di4fslez765ux4kse3o4lxcnpgid.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbuxq57hyskobn5xwtw26rkq4wyvttory6k7pio2lv5adeopeezv6ad.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbvhambmct5s4rpf2b65mrnqynhpn4hksq47io2wow5cjtv3xmsypid.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbw6uqp2te2f323ltn2fgwl5tu5cr3udoj3ik2obdtr5367skuh4cid.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbw7j6si6k2bzxd4tzvesoijfjtr4pa6awqie63rmkpql7hmu6tqnqd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbxv6nlojheut6th4nqwpabr4gtksm7y7f4c52ubvvvumydpo4dmryd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbzlychkbilhjsw5hhuvk7zk4axdffy3nvel3zaqwnuo2d4nlqqkeyd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbzme4ctvcgzo5lq7jvcdy2v2cs6hrlgihsmylfddprzqptm6ywhhyd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbfsazjqqwvtq2ckhm53kfmvsy7c6sdci3uy6qui4lv66aeef7hhpad.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbgv7wsi6bpguvjbu6omdgwzllqm5tvdo65do2q7vw4er7aqrnjmtad.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbjmbkvw3yurmnazwkbj5muyvw5dd6y7hyxrus23y33qiqczclrnbyd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbpoq6d2jglpw7dxarr6oaakgnlxt5nmrza5ojlufsuffuzexajsuyd.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbp2rsfcmg5durpwgs22wxrdngsa4wiwmc4xk6hgmuluy6bvbvvtlid.onion/ |
Screen |
Humanity check |
⬇️ |
2024-09-30 |
http://lbbov7weoojwnqytnjqygmglkwtim5dvyw3xvoluk5ostz75ofd6enqd.onion/ |
Screen |
Title |
⬇️ |
2024-10-16 |
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion/ec_page3.php |
Screen |
LockBit - Leaked |
⬆️ |
2025-08-20 |
http://lockbitfnszjao7hayqsd424m74k5jxc52hozvabjrut7pjfsfaaaoad.onion |
Screen |
|
⬇️ |
Never |
http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion/ |
|
|
⬇️ |
Never |
http://lockbitsupdwon76nzykzblcplixwts4n4zoecugz2bxabtapqvmzqqd.onion/ |
|
|
⬇️ |
Never |
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion/ |
|
|
⬇️ |
Never |
http://lockbitsupo7vv5vcl3jxpsdviopwvasljqcstym6efhh6oze7c6xjad.onion/ |
|
|
⬇️ |
Never |
http://lockbitsupq3g62dni2f36snrdb4n5qzqvovbtkt5xffw3draxk6gwqd.onion/ |
|
|
⬇️ |
Never |
http://lockbitsupqfyacidr6upt6nhhyipujvaablubuevxj6xy3frthvr3yd.onion/ |
|
|
⬇️ |
Never |
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion/ |
|
|
⬇️ |
Never |
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion/ |
|
|
⬇️ |
Never |
http://lockbitsupxcjntihbmat4rrh7ktowips2qzywh6zer5r3xafhviyhqd.onion/ |
|
|
⬇️ |
Never |
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/ |
|
|
⬇️ |
Never |
http://lockbitfshjx7xrlafzhohinfu3theolrjakrlxoduwk65d755yahuqd.onion/ |
|
|
⬇️ |
Never |
http://lockbitfsnvvv5dbubfbhb4qo23olw5n3a2pqs72p3yh2g6prkxrhvad.onion/ |
|
|
⬇️ |
Never |
http://lockbitfsxt2gdyz72harnb7qa5qa6sf73bvy7wz65fuiw7vlxarujid.onion/ |
|
LockBit Private Note |
⬇️ |
2025-08-20 |
http://lockbitpn4nmflibn4cooh4sydie6bpoy33tbxa3rjebryxc5vblkwyd.onion/ |
Screen |
LockBit Private Note |
⬇️ |
2025-08-20 |
http://lockbitpn7doehfdzu3r2orcibdx6njq62aavkr4hgh3p6rednr5gfad.onion/ |
Screen |
LockBit Private Note |
⬆️ |
2025-08-20 |
http://lockbitpntsng25yxacx5jqdccvoqd5qtyzzximljfskvtk6ektjhvad.onion/ |
Screen |
|
⬇️ |
2024-12-18 |
http:// lockbit7ixelt7gn3ynrs3dgqtsom6x6sd2ope4di7bu6e6exyhazeyd.onion/ |
|
Humanity check |
⬇️ |
2025-07-07 |
http://lockbit7xn7nqc5f5gfhv6qrf46xlh65lscuzctwnmomthcigu2m3tad.onion/ |
Screen |
Humanity check |
⬇️ |
2025-07-07 |
http://lockbitbvcwegcbou4fulv3iy3bpwh2do3y243w2riwbgcdpl3hd3uyd.onion/ |
Screen |
LockBit - Leaked |
⬇️ |
2025-08-19 |
http://lockbit7z3ujnkhxwahhjduh5me2updvzxewhhc5qvk2snxezoi5drad.onion/ |
Screen |
LockBit LOGIN |
⬆️ |
2025-08-20 |
http://lockbitsptqsmaf56cmo7bieqwh5htlsfkodpahsaurxlquoz67zwrad.onion/ |
Screen |
LockBit File Share |
⬇️ |
2025-08-20 |
http://lockbitfsvf75glg226he5inkfgtuoakt4vgfhd7nfgghx5kwz5zo3ad.onion/ |
Screen |
LockBit File Share |
⬆️ |
2025-08-20 |
http://lockbitfskq2fxclyfrop5yizyxpzu65w7pphsgthawcyb4gd27x62id.onion/ |
Screen |
LockBit File Share |
⬇️ |
2025-08-20 |
http://lockbitfss2w7co3ij6am6wox4xcurtgwukunx3yubcoe5cbxiqakxqd.onion/ |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
LockBit Tech Works |
⬆️ |
2025-08-20 |
http://lockbitapyx2kr5b7ma7qn6ziwqgbrij2czhcbojuxmgnwpkgv2yx2yd.onion/ |
Screen |
LockBit Tech Works |
⬇️ |
2025-06-03 |
http://lockbitapyum2wks2lbcnrovcgxj7ne3ua7hhcmshh3s3ajtpookohqd.onion/ |
Screen |
LockBit Tech Works |
⬇️ |
2025-08-20 |
http://lockbitapp24bvbi43n3qmtfcasf2veaeagjxatgbwtxnsh5w32mljad.onion/ |
Screen |
LockBit Tech Works |
⬆️ |
2025-08-20 |
http://lockbitapo3wkqddx2ka7t45hejurybzzjpos4cpeliudgv35kkizrid.onion/ |
Screen |
LockBit Tech Works |
⬆️ |
2025-08-20 |
http://lockbitapiahy43zttdhslabjvx4q6k24xx7r33qtcvwqehmnnqxy3yd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://wm6mbuzipviusuc42kcggzkdpbhuv45sn7olyamy6mcqqked3waslbqd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://6dtxgqam4crv6rr6.onion/ |
|
None |
⬇️ |
Never |
http://i3ezlvkoi7fwyood.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Welcome to nginx! |
⬇️ |
2025-07-20 |
http://ugn5khvt4kitlivv4ddfh3lb6mdhn2ud3ximcaypy73hxlk3arj2goad.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2022-08-27 |
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion |
Screen |
|
⬇️ |
2023-05-11 |
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion |
Screen |
|
⬇️ |
2022-10-01 |
http://nclen75pwlgebpxpsqhlcnxsmdvpyrr7ogz36ehhatfmkvakeyden6ad.onion |
Screen |
404 Not Found |
⬇️ |
2024-04-21 |
http://mmcbkgua72og66w4jz3qcxkkhefax754pg6iknmtfujvkt2j65ffraad.onion/ |
Screen |
None |
⬇️ |
Never |
http://tzw7ckhurmxgcpajx6gy57dkrysl2sigfrt6nk4a3rvedfldigtor7ad.onion |
|
None |
⬇️ |
Never |
http://34vm2smykaqtzzzm4bgycfzg5fwyhhksrkpahdbiswmmuwuu7hmvuvqd.onion |
|
None |
⬇️ |
Never |
http://u2kqti2utfaiefucegnmd6yh6hledbsfanaehhnnn3q5usk6bvndahqd.onion |
|
None |
⬇️ |
Never |
http://mrv44idagzu47oktcipn6tlll6nzapi6pk3u7ehsucl4hpxon45dl4yd.onion |
|
Description
Tesorion describes Lorenz as a ransomware with design and implementation flaws, leading to impossible decryption with tools provided by the attackers. A free decryptor for 2021 versions was made available via the NoMoreRansom initiative. A new version of the malware was discovered in March 2022, for which again was provided a free decryptor, while the ransomware operators are not able to provide tools to decrypt affected files.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Lorenz |
⬇️ |
2024-08-14 |
http://lorenzmlwpzgxq736jzseuterytjueszsvznuibanxomlpkyxk6ksoyd.onion/ |
Screen |
None |
⬇️ |
Never |
http://woe2suafeg6ehxivgvvn4nh6ectbdhdqgc4vzph27mmyn7rjf2c52jid.onion |
|
None |
⬇️ |
Never |
http://lorenzedzyzyjhzxvlcv347n5piltxamo755pzqpozh5l47kj7mxueid.onion/ |
|
None |
⬇️ |
Never |
http://lorenzezzwvtk3y24wfph4jpho27grrctqvf6yvld7256rnoz7yg2eid.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
LostTrust home |
⬇️ |
2023-11-02 |
http://hscr6cjzhgoybibuzn2xud7u4crehuoo4ykw3swut7m7irde74hdfzyd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://luckbit53sdne5yd5vdekadhwnbzjyqlbjkc4g33hs6faphfkvivaeid.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2025-06-04 |
http://dfi7ynmrugokn4fgvpbz5unt4d6k2i5abyez7wnoxxa2ifaw6s5puzqd.onion/ |
Screen |
Chat-room |
⬇️ |
2025-06-04 |
http://dfi7ynmrugokn4fgvpbz5unt4d6k2i5abyez7wnoxxa2ifaw6s5puzqd.onion/TOPDz/data/ |
Screen |
Description
parser needs to be built
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
LV Blog |
⬇️ |
2022-12-20 |
http://rbvuetuneohce3ouxjlbxtimyyxokb4btncxjbo44fbgxqy7tskinwad.onion/ |
Screen |
Start-maximized.com |
⬇️ |
2022-03-19 |
http://4qbxi3i2oqmyzxsjg4fwe4aly3xkped52gq5orp6efpkeskvchqe27id.onion/ |
|
None |
⬇️ |
Never |
http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion/ |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Lynx |
⬇️ |
2025-05-26 |
http://lynxblog.net/ |
Screen |
Lynx |
⬇️ |
2024-08-03 |
http://lynxbllrfr5262yvbgtqoyq76s7mpztcqkv6tjjxgpilpma7nyoeohyd.onion/leaks |
Screen |
Lynx |
⬇️ |
2025-05-09 |
http://lynxch2k5xi35j7hlbmwl7d6u2oz4vp2wqp6qkwol624cod3d6iqiyqd.onion/login |
Screen |
Lynx |
⬇️ |
2025-05-26 |
http://lynxblog.net/leaks |
Screen |
Lynx |
⬇️ |
2025-08-20 |
http://lynxchatly4zludmhmi75jrwhycnoqvkxb4prohxmyzf4euf5gjxroad.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxchatohmppv6au67lloc2vs6chy7nya7dsu2hhs55mcjxp2joglad.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxchatbykq2vycvyrtjqb3yuj4ze2wvdubzr2u6b632trwvdbsgmyd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxchatde4spv5x6xlwxf47jdo7wtwwgikdoeroxamphu3e7xx5doqd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxchatdy3tgcuijsqofhssopcepirjfq2f4pvb5qd4un4dhqyxswqd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxchatdykpoelffqlvcbtry6o7gxk3rs2aiagh7ddz5yfttd6quxqd.onion/login |
Screen |
Lynx |
⬇️ |
2025-07-09 |
http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxblogco7r37jt7p5wrmfxzqze7ghxw6rihzkqc455qluacwotciyd.onion/leaks |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxblogijy4jfoblgix2klxmkbgee4leoeuge7qt4fpfkj4zbi2sjyd.onion/leaks |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxblogmx3rbiwg3rpj4nds25hjsnrwkpxt5gaznetfikz4gz2csyad.onion/leaks |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxblogoxllth4b46cfwlop5pfj4s7dyv37yuy7qn2ftan6gd72hsad.onion/leaks |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxblogtwatfsrwj3oatpejwxk5bngqcd5f7s26iskagfu7ouaomjad.onion/leaks |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxblogxutufossaeawlij3j3uikaloll5ko6grzhkwdclrjngrfoid.onion/leaks |
Screen |
|
⬇️ |
2025-05-16 |
http://lynxstorage1.net/ |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxchatfw4rgsclp4567i4llkqjr2kltaumwwobxdik3qa2oorrknad.onion/ |
Screen |
|
⬇️ |
Never |
http://lynxba5y5juv3c4de2bftamjkbxvcuujr5c5wn4hq2fwmt66pxb7qqad.onion |
|
Lynx |
⬇️ |
2025-05-15 |
http://lynxchat.net |
Screen |
|
⬆️ |
2025-08-20 |
http://lynxcdnjg43re373nltauhdqfbau25mwawsg42h4lswfe455uaznilad.onion/ |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxad2seqpyu52lr5v7il4idasv23535a46s4bj65b3v7t5y6u5daqd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynx2m7xz73zpmlm5nddbokk6a55fh2nzjq2r5nk2hbdbk74iddqfiqd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxcwuhva6qzlnj3m3qrcl6bgvnxpixg5vsikf53vutdf3ijuv2pxyd.onion/login |
Screen |
Lynx |
⬇️ |
2025-08-20 |
http://lynxcyys7c2np3b3er2wo6sufwoonmh6i3nykv53pst336c3ml4ycjqd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxdehvlvrrtnhtpuy6bhrxffzvl5j7y7p3zl553slzq44lcb2jzkyd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxikczcyposxfz5a7hxbqxilsrtx7zdzwmhk5wcb5qoatbv2suizid.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxroggpujfxy7xnlrz3yknphqgk4k5dy4rhaldgz2hpxyyy3ncuvad.onion/login |
Screen |
Lynx |
⬇️ |
2025-08-20 |
http://lynxoifh5boac42m6xdoak6ne7q53sz7kgaaze7ush72uuetbnjg2oqd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynx25vsi4cxesh44chevu2qyguqcx4zrjsjd77cjrmbgn75xkv626yd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxaeddweqscykez5rknrug6ui5znq4yoxof5qnusiatiyuqqlwhead.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxbk3nzrnph5z5tilsn3twfcgltqynaofuxgb5yt43vdu266z3vvyd.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxhwtifuwxs2zejofpagvzxf7p2l3nhdi3zlrap3y2wsn5hqyfeuid.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxjamasdeyeeiusfgfipfivewc3l3u34hyiiguhdyj776mh535l4ad.onion/login |
Screen |
Lynx |
⬆️ |
2025-08-20 |
http://lynxk7rmhe7luff3ed7chlziwrju34pzc5hm452xhryeaeulc3wxc3ad.onion/login |
Screen |
|
⬆️ |
2025-08-20 |
http://lynxcdn6yh5inxdqregzgm674qlbwzrmvozmejuercv2zq3nlugifoad.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Group is also currently known as MADDLL32 and Metatron.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
MADDLL32 - LEAKED FILES |
⬇️ |
2024-10-03 |
http://k67ivvik3dikqi4gy4ua7xa6idijl4si7k5ad5lotbaeirfcsx4sgbid.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Posts | Somos malas... podemos ser peores |
⬆️ |
2025-08-20 |
http://malas2urovbyyavjzaezkt5ohljvyd5lt7vv7mnsgbf2y4bwlh72doqd.onion/posts/ |
Screen |
|
⬆️ |
2025-08-20 |
http://malas2urovbyyavjzaezkt5ohljvyd5lt7vv7mnsgbf2y4bwlh72doqd.onion/atom.xml |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Just a moment... |
⬇️ |
2024-11-10 |
https://malekteam.ac |
Screen |
Malek Team |
⬇️ |
2025-05-06 |
http://195.14.123.2/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Mallox | Data Leaks |
⬇️ |
2025-01-21 |
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion |
Screen |
None |
⬇️ |
Never |
http://wtyafjyizleuw4yhepmdsrcfjwmtiysunos6ixchw3r5d7eeimw2rrid.onion |
|
Mallox | Sign in |
⬇️ |
2025-01-21 |
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
DragonForce | Oops... |
⬇️ |
2025-03-19 |
http://owt3kwkxod2pvxlv3uljzskfhebhrhoedrh5gqrxyyd6rrco4frzj5ad.onion/ |
Screen |
|
⬇️ |
2025-03-19 |
http://185.158.113.114:5000/affiliate/login |
Screen |
|
⬇️ |
2025-03-19 |
http://185.158.113.114:5000/admin/login |
Screen |
None |
⬇️ |
Never |
http://bdhjur3agrogoxvwobbzpptkxhyewnjrhzqj4ug2dyfhf3dopyvvurid.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Maze Ransomware encrypts files and makes them inaccessible while adding a custom extension containing part of the ID of the victim. The ransom note is placed inside a text file and an htm file. There are a few different extensions appended to files which are randomly generated.
Actors are known to exfiltrate the data from the network for further extortion. It spreads mainly using email spam and various exploit kits (Spelevo, Fallout).
The code of Maze ransomware is highly complicated and obfuscated, which helps to evade security solutions using signature-based detections.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://xfr3txoorcyy7tikjgj5dk3rvo3vsrpyaxnclyohkbfp3h277ap4tiad.onion |
|
None |
⬇️ |
Never |
http://aoacugmutagkwctu.onion/ |
|
|
⬆️ |
2025-08-20 |
https://mazedecrypt.top/ |
Screen |
None |
⬇️ |
Never |
http://dnspexdevfbct2agyu3oxrmhm4ggf4ec6iwpnlb3kwb2rigrtuz3sayd.onion/ |
|
None |
⬇️ |
Never |
http://xjypo5vzgmo7jca6b322dnqbsdnp3amd24ybx26x5nxbusccjkm4pwid.onion/ |
|
None |
⬇️ |
Never |
http://Newsmaze.top |
|
None |
⬇️ |
Never |
http://mazenews.top |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://xembshruusobgbvxg4tcjs3jpdnks6xrr6nbokfxadcnlc53yxir22ad.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Human Verify |
⬇️ |
2024-03-01 |
http://medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion |
Screen |
Human Verify |
⬆️ |
2025-08-20 |
http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion |
Screen |
503 Service Temporarily Unavailable |
⬇️ |
2024-06-03 |
http://dlmfciajg5s4vliyo5dhs5jyzhi2xr2fnkebul46lpf4xudtqiue4nid.onion/ |
Screen |
Human Verify |
⬇️ |
2024-07-30 |
http://kyfiw76eol6ph2mq7pi5e5tdvce37bicddhai62qhdc5ja6jdchz4qqd.onion/ |
Screen |
Human Verify |
⬇️ |
2024-07-15 |
http://62foekhv5humjrfwjdyd2dgextpbf5i7obguhwvfoghmu3nxpkmxlcid.onion/ |
Screen |
Human Verify |
⬆️ |
2025-08-20 |
http://cx5u7zxbvrfyoj6ughw76oa264ucuuizmmzypwum6ear7pct4yc723qd.onion |
Screen |
Human Verify |
⬇️ |
2024-06-13 |
http://hupxs7ps7md24kpz4lwsbra64abgxjx3pcc2wuca5ibawf2g5hlpfyqd.onion |
Screen |
osintcorp.net | 520: Web server is returning an unknown error |
⬆️ |
2025-08-20 |
http://osintcorp.net |
Screen |
Medusa Chat |
⬆️ |
2025-08-20 |
http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/ |
Screen |
Medusa Chat |
⬇️ |
2025-01-19 |
http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/ |
Screen |
|
⬇️ |
Never |
http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion |
|
Human Verify |
⬇️ |
2025-08-20 |
http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion |
Screen |
|
⬇️ |
Never |
http://medusakxxtp3uo7vusntvubnytaph4d3amxivbgg13hnhpk2nmus34yd.onion/227098164ef1fdb119ef537986bbdf24 |
|
504 Gateway Time-out |
⬇️ |
2025-02-13 |
http://hm2hlugduzuxiya5bgrsewfxmrzxbmslvg3t42zdzsorcn2nyfbrh6qd.onion/ |
Screen |
Human Verify |
⬇️ |
2025-08-20 |
http://7aqabivkwmpvjkyefonf3gpy5gsubopqni7kcirsrq3pflckxq5zz4id.onion/ |
Screen |
None |
⬇️ |
Never |
http://762a33bcwneu3i6m7g4unj7xoyvl3nolnbeqhm4jfap6d7uczj43mrqd.onion |
|
None |
⬇️ |
Never |
http://x4tqo27mrr5q5wobpuvw6rowmbclwe5h62etslydc6wnona73pmqwaid.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
MEOW |
⬇️ |
2024-11-26 |
http://meow6xanhzfci2gbkn3lmbqq7xjjufskkdfocqdngt3ltvzgqpsg5mid.onion/ |
Screen |
None |
⬇️ |
Never |
http://totos7fquprkecvcsl2jwy72v32glgkp2ejeqlnx5ynnxvbebgnletqd.onion |
|
None |
⬇️ |
Never |
http://ikjht3url3tvx6itf2eghtrmwlmjfywz63ymnxghwwyhflcxnqffhvid.onion |
|
None |
⬇️ |
Never |
http://mops6j3iuepvarl7ackf2itjkt4in3xkcbupnhy656byx6m6hnxkbgid.onion |
|
None |
⬇️ |
Never |
http://meowthxcf4tm3rujk4bsjaoxd2ghmjx7vi342hz6zdu3lfyeykmc4wqd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
We are a group of young people who identify themselves as specialists in the field of network security with at least 15 years of experience. This blog and this work are ONLY commercial use, besides not the main one. We have nothing to do with politics, intelligence agencies and the NSB. If you are a hunter of other people's data, then download any files and (or) wait until the time expires for others and the files will be available here. If you have any personal suggestions, we are ready to consider them. Contact us on the "contacts" page. There are a lot of other data, for various reasons, not posted here and we can discuss their sale or transfer under certain conditions. Also, every incident is notified to all possible press in the region and data not intended for sale is transmitted to breached and similar forums. Subscribe to RSS, add to favorites, visit us more often.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Metaencryptor::Home |
⬇️ |
2025-07-20 |
http://metacrptmytukkj7ajwjovdpjqzd7esg5v3sg344uzhigagpezcqlpyd.onion/ |
Screen |
Metaencryptor::Home |
⬇️ |
2025-07-20 |
https://metacrpttdfpbm4qoxzcrqqgr6e6zafpazgxm72knmujw2mwvi34rwad.onion |
Screen |
Description
This malware written in C# is a variant of the Thanos ransomware family and emerged in October 2021 and is obfuscated using SmartAssembly. In 2022, ThreatLabz analysed a report of Midas ransomware was slowly deployed over a two month period (ZScaler). This ransomware features also its own data leak site as part of its double extortion strategy.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Info |
⬇️ |
2022-04-15 |
http://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad.onion/blog.php |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Mimic v.10 Ransomware-as-a-Service (RaaS). The malware is designed to target various operating systems (Windows, ESXi, NAS, FreeBSD) and features network-wide deployment, file obfuscation, backup destruction, UAC bypass, and multithreaded encryption. The service offers additional tools like NTLM password decryption and call-based extortion. They prohibit attacks on CIS countries and require active participation, with decryption tools available for a fee currently 800USD.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://dfpc7yvle5kxmgg6sbcp5ytggy3oeob676bjgwcwhyr2pwcrmbvoilqd.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Mogilevich | Blog | Home |
⬇️ |
2024-03-03 |
http://dkgn45pinr7nwvdaehemcrpgcjqf4fooit3c4gjw6dhzrp443ctvnoad.onion |
Screen |
Mogilevich | Blog | Leaks |
⬇️ |
2024-03-03 |
http://dkgn45pinr7nwvdaehemcrpgcjqf4fooit3c4gjw6dhzrp443ctvnoad.onion/leaks.html |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://moishddxqnpdxpababec6exozpl2yr7idfhdldiz5525ao25bmasxhid.onion |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
News |
⬆️ |
2025-08-20 |
http://blogvl7tjyjvsfthobttze52w36wwiz34hrfcmorgvdzb6hikucb7aqd.onion |
Screen |
None |
⬇️ |
Never |
http://clientcuworpelkdwecucgvfhp5uz5n7uohsnokndrlhm2zkntyg3had.onion/ |
|
The Egyptian Tax Authority (ETA) |
⬆️ |
2025-08-20 |
http://6xkylzxoxpd6bnl5ymhr6hysaoe3bsxzxhxpydhv22fmnt6m5zrlpvad.onion/ |
Screen |
First Baptist Medical Center |
⬆️ |
2025-08-20 |
http://l7eupjzxzfbsw7nxu7wu7lj2lzr5ulmyuyd4neyasbdmvzcedal7mmid.onion/ |
Screen |
Insurance Agency Marketing Services |
⬆️ |
2025-08-20 |
http://qyk5o7wcgocwebnymjusnc7siyetwl7po26flw4e6hhg2xiue7brvmid.onion/ |
Screen |
Anna Jaques Hospital |
⬆️ |
2025-08-20 |
http://bolfkdkjbdig64ieqixpyhmquuadkm6nzohutbkfwgzftd35kipy45ad.onion/ |
Screen |
Tri-Way Manufacturing Technologies |
⬆️ |
2025-08-20 |
http://742srdwxlwiu75kr3sbf6kzwjcxjwezvpi3s76ignhes3vqacvh3e4ad.onion/ |
Screen |
Toscana Promozione |
⬆️ |
2025-08-20 |
http://nhdmgcysxuvvmd4dqwqisxumirvcj6xfhahuds5z7qgj7qlr3i73nnqd.onion/ |
Screen |
Maxco Supply |
⬆️ |
2025-08-20 |
http://jioj2j5k53vrhtdgvjmeijgkdxgwadzjacywnybjvqftbkqpt3oy6cid.onion/ |
Screen |
MD LOGISTICS |
⬇️ |
2025-08-20 |
http://372bkntomuk4xmevyki2gvpzdsm77xkhp4z6sctugcogqwgpqj4xkjyd.onion/ |
Screen |
Taylor University |
⬆️ |
2025-08-20 |
http://vycmr2wn5nqhkpla62mqe4vxh4fgdbc5id4g6piy4mvbjnb4mp4t25yd.onion/ |
Screen |
Riverside Logistics |
⬆️ |
2025-08-20 |
http://jg7qeqdbqqordr5tazw5zc7s2h4sk2pt2hx4cxycqrcwr7vtpmreshad.onion/ |
Screen |
Aiphone |
⬆️ |
2025-08-20 |
http://lhzaw2b2xn6lmtoioiswufyvjnrghlkmhtvwgsrsjnnmj2ceu56popqd.onion/ |
Screen |
Estes Design & Manufacturing |
⬆️ |
2025-08-20 |
http://d2vda7sp7rxuizyduwvnvccs3giddkwgglj5ecgrmdpu32grp2txjeqd.onion/ |
Screen |
None |
⬇️ |
Never |
http://26kbddrpm2xfjg4unow76xyvrffwh4usqjhsqgalf4h3diiujy75ngqd.onion/ |
|
None |
⬇️ |
Never |
http://moze6ryu3ev65tgmssb4sckagkgfzmjtsxg2d6xrjjua2dke5lagcxqd.onion/ |
|
None |
⬇️ |
Never |
http://au6l74lej2qvwrvasdyc5ta4g7jdshjwkzbi635g6uztld2n2fcacyad.onion/ |
|
None |
⬇️ |
Never |
http://wzu6yixpcohxeeunakzqf42dothwikt3gvtovamxdm6rfl3oe6smywyd.onion/ |
|
None |
⬇️ |
Never |
http://p6kxp556kkcbjdjsg24g3edmvr7v7ujecuychw4ibvqhl6wuomnrgbqd.onion/ |
|
None |
⬇️ |
Never |
http://z46mj5ihckzwf2ons46ceryjwyxt3ctrqyglmre5uhnipvoepaciulid.onion/ |
|
None |
⬇️ |
Never |
http://vkge4tbgo3kfc6n5lgjyvb7abjxp7wdnaumkh6xscyj4dceifieunkad.onion/ |
|
None |
⬇️ |
Never |
http://3w3uuz4vze6wdwxrebn3oaavft47xtvghl7qcmpqclgojr44muaigwyd.onion/ |
|
None |
⬇️ |
Never |
http://client372kkzvqpgniqp6r5rqkg22yrlhstxiaxskeowp2hrperdelad.onion |
|
National Atomic Energy Commission |
⬆️ |
2025-08-20 |
http://xq5t7xwptmpoxzjkns7wfbbr43zxedm6ygbfsh6bp6lipvyhzkfopjyd.onion/ |
Screen |
Kazyon |
⬆️ |
2025-08-20 |
http://pdndkkg2hu4z36yhrbgtycxf52iodlh5os4argm2ooia4ypwgnvlzgqd.onion/ |
Screen |
Marina Family Medical |
⬇️ |
2025-08-20 |
http://md7a4mzsppjuaw4zczoojpo7arqrlnmhlqoo35ttrc7l2lpeiblx2yqd.onion/ |
Screen |
The Tech Interactive |
⬆️ |
2025-08-20 |
http://l4wvjhcng4klrah4gldyyvo3x5p5o4frzbvwdhzqa6vkg2chistqj3yd.onion/ |
Screen |
Young Adjustment Company |
⬆️ |
2025-08-20 |
http://d26nwzgwylb3no3ar3rt3si3e3ujzndhp5wryxxlr76wba5snhap3tyd.onion/ |
Screen |
Bucks County Opportunity Council, INC. |
⬆️ |
2025-08-20 |
http://z33ua54qzvzyxtbe5oghqyvxfs5orftqlws3w5ndrtsvmaldcvbyf5ad.onion/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Blog |
⬇️ |
2022-09-28 |
http://monteoamwxlutyovf7oxeviwjlbu3vbgdmkncecl2ydteqncrmcv67yd.onion/ |
Screen |
Data Market |
⬇️ |
2022-09-28 |
http://monteoamwxlutyovf7oxeviwjlbu3vbgdmkncecl2ydteqncrmcv67yd.onion/catalog/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
404 Not Found |
⬇️ |
2022-10-10 |
http://4s4lnfeujzo67fy2jebz2dxskez2gsqj2jeb35m75ktufxensdicqxad.onion/ |
Screen |
MONTI - Leaks site |
⬇️ |
2025-05-17 |
http://mblogci3rudehaagbryjznltdp33ojwzkq6hn2pckvjq33rycmzczpid.onion/ |
Screen |
None |
⬇️ |
Never |
http://fzuaswymt34cbkneudijgqrzkalrgpsyfbo6uuodoeifwiqf3cwqscid.onion/ |
|
None |
⬇️ |
Never |
http://oiatmncwdk6jnavutic5zusl4sttwschx7nicvqykluyckekex3zqaad.onion/ |
|
None |
⬇️ |
Never |
http://jblxfrssnygh7bsoyict5wccgahvqp6tauncixr3y3dxypidiqy4tjyd.onion/ |
|
None |
⬇️ |
Never |
http://egtqjenfxq7g6sqnjknww3tsnlutzqlq747cf73ni3xsfxzqqz2f5qad.onion/ |
|
Index of / |
⬇️ |
2024-12-15 |
http://edaus74qljecooagcvcg67quldd2hwokkr5zqj5jtdeuidgjoesvwdad.onion/ |
Screen |
Apache2 Ubuntu Default Page: It works |
⬇️ |
2025-05-24 |
http://gchf5ohuxo36metdnt3hfdz6m4up3pmv6t6m63llvldtnh57guwnp4qd.onion/ |
Screen |
Index of / |
⬇️ |
2024-12-20 |
http://363zyixg32bdudpakmd4n4bclbprcqrkyvdssv6yamozfurodktss2qd.onion/ |
Screen |
Index of / |
⬇️ |
2024-12-29 |
http://trqm74keteqm7jdathr2fgljf5tdhtifocoii4inmdu66ekpaotihvyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-05-21 |
http://usmrktigxirv2qvpkwjr5n3pxz5hpsucffzujuo7e6f3y6se7uiqzwyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-05-30 |
http://bvxhv3zfewf5jx4gcrsxrwbuwmjggffxjyv42vwj6b6u2clmgchxtfid.onion/ |
Screen |
Index of / |
⬇️ |
2024-12-28 |
http://drfxoorlgu5n4c4uhnfli7saprnl2p46i36duhyehmfp7ysn44e3quid.onion/ |
Screen |
Index of / |
⬇️ |
2025-05-19 |
http://t4h4hbkrrbrrfkbf6luhnewykjr52gkdmgfr6hbeeub5t2rcyhb4buad.onion/ |
Screen |
Index of / |
⬇️ |
2025-05-19 |
http://yyn3h2lnr5joqebus5syb2p3fzdms7avulvsn3m3gsdvwtgu2ow5c6ad.onion/ |
Screen |
Index of / |
⬇️ |
2025-05-19 |
http://v4httzsp6ri6xcw7lpmdduvhce5avtla3yocfru5suxpgcgo7rw7slyd.onion/ |
Screen |
Server Error |
⬇️ |
2025-08-04 |
http://myosbja7hixkkjqihsjh6yvmqplz62gr3r4isctjjtu2vm5jg6hsv2ad.onion/chat |
Screen |
None |
⬇️ |
Never |
http://qkbbaxiuqqcqb5nox4np4qjcniy2q6m7yeluvj7n5i5dn7pgpcwxwfid.onion |
|
|
⬇️ |
2025-08-04 |
http://monti5o7lvyrpyk26lqofnfvajtyqruwatlfaazgm3zskt3xiktudwid.onion |
Screen |
|
⬇️ |
2025-05-26 |
http://il6jcce6f5htppc3smu4olpt5pz3akdg5h7k7tb4n45jixxu2o2oxlid.onion/ |
Screen |
Directory listing for / |
⬇️ |
2025-03-15 |
http://cls2wzky5vxgu54fg4fqdj4q4olyvmwt6rinmtgqsq5d3vubv7bdzgqd.onion/ |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
MORPHEUS (contact morpheus.support@onionmail.org) |
⬇️ |
2025-08-03 |
http://izsp6ipui4ctgxfugbgtu65kzefrucltyfpbxplmfybl5swiadpljmyd.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://mountnewsokhwilx.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬆️ |
2025-08-20 |
http://mydatae2d63il5oaxxangwnid5loq2qmtsol2ozr6vtb7yfm5ypzo6id.onion/blog |
Screen |
|
⬇️ |
Never |
http://xszpovfd3q52omk5larjf4y7rziov2oee4u4amcm32wwsxc7ublmdtid.onion/ |
|
|
⬇️ |
Never |
http://ot3vo3od2pajc7ymxdk6wimur7j7pgs2agvqlzyculowk3yoxzene2id.onion |
|
|
⬇️ |
Never |
http://2id7ik6lkd3jjjjlaarr3wckrxidp3bgl2jn5nhqciouk2ehuyakdiqd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://58b87e60649ccc808ac8mstiejnj.5s4ixqul2enwxrqv.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://n3twormruynhn3oetmxvasum2miix2jgg56xskdoyihra4wthvlgyeyd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://nagapay2ypwzsj7gb2hllyelhc6uepfrx7u356slaaemshrooxhbvfyd.onion/ |
|
Description
According to Vitali Kremez and Michael Gillespie, this ransomware shares much code with Nemty 2.5. A difference is removal of the RaaS component, which was switched to email communications for payments. Uses AES-128, which is then protected RSA2048.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://hxt254aygrsziejn.onion |
|
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
404 - Page Not Found |
⬇️ |
2025-08-13 |
http://k7kzrgcoxsjm7fujj5votltw44vhidneye2dkzcnrw7k7gihhpxmctqd.onion/ |
Screen |
Description
Nemty is a ransomware that was discovered in September 2019. Fortinet states that they found it being distributed through similar ways as Sodinokibi and also noted artfifacts they had seen before in Gandcrab.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://zjoxyw5mkacojk5ptn2iprkivg5clow72mjkyk5ttubzxprjjnwapkad.onion |
|
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion |
|
None |
⬇️ |
Never |
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
NEVADA |
⬇️ |
2023-04-21 |
http://nevcorps5cvivjf6i2gm4uia7cxng5ploqny2rgrinctazjlnqr2yiyd.onion/ |
Screen |
Error |
⬇️ |
2023-04-21 |
http://nevbackvzwfu5yu3gszap77bg66koadds6eln37gxdhdk4jdsbkayrid.onion/ |
Screen |
None |
⬇️ |
2021-05-01 |
http://nevaffcwswjosddmw55qhn4u4secw42wlppzvf26k5onrlxjevm6avad.onion/ |
|
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Night Sky |
⬇️ |
2022-01-25 |
http://gg5ryfgogainisskdvh4y373ap3b2mxafcibeh2lvq5x7fx76ygcosad.onion |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
NightSpire |
⬇️ |
2025-04-27 |
http://nspireyzmvapgiwgtuoznlafqvlyz7ey6himtgn5bdvdcowfyto3yryd.onion/ |
Screen |
NightSpire |
⬇️ |
2025-04-27 |
http://nspireyzmvapgiwgtuoznlafqvlyz7ey6himtgn5bdvdcowfyto3yryd.onion/datas.php |
Screen |
NightSpire |
⬆️ |
2025-08-20 |
http://a2lyiiaq4n74tlgz4fk3ft4akolapfrzk772dk24iq32cznjsmzpanqd.onion/ |
Screen |
Hello World | NightSpire |
⬆️ |
2025-08-20 |
http://nspiremkiq44zcxjbgvab4mdedyh2pzj5kzbmvftcugq3mczx3dqogid.onion/ |
Screen |
Hello World | NightSpire |
⬆️ |
2025-08-20 |
http://nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion/ |
Screen |
Database | NightSpire |
⬆️ |
2025-08-20 |
http://nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion/database |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
NitroBlog |
⬆️ |
2025-08-20 |
http://nitrogenczslprh3xyw6lh5xyjvmsz7ciljoqxxknd7uymkfetfhgvqd.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-20 |
http://2u6njk55okdxvrup5feu3wbhyxvlqla7yuj2oz3xkzz27yzc66vcirqd.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-20 |
http://jzl4bylm4bng2zgmeqw3lx6bcbxzb2hulicxneuosq26sshnitrcvcad.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-20 |
http://6a5ib4udgwlkyl3zzeyenedcb7d33j2vq7egpqykr5457uiskeu6zjad.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-01-24 |
http://hzyp7n436ecwo73xvrgnf5wmbjewszwut4h6vz4fu6f2oqd5zfcd7sad.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-21 |
http://67hvtslok5a4cwjxfmidbgbunsvckypf2dwkpxg3y2sabar5b4jidmyd.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-12 |
http://sqnnhgqr4iiwnkaih6vspyxmebz2vvjv3uybmjdynw6sne5plilunhyd.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-19 |
http://z4tonbkjybcllsvd45smpkqkk5uaspmlnvmysrkxt37wuudijvp7k2id.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-24 |
http://awrfq7pjydfp3hwbsun6ltxrrzths5ztgxj7i7ybx7twjrdvzvxkgwad.onion |
Screen |
Welcome to nginx! |
⬇️ |
2024-12-23 |
http://vkl3xfkp2vtpdzk7ohock3w2oiwwtvgnwbwvurrqafh5nhw23h43dbid.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2024-12-15 |
http://wjwbqeuni4zslbm4cduvo7uwyo653k4gdx2x4irj4zkrwyerksdcxryd.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-01-07 |
http://whdoefodpz4jjpwr5imipdntkh6kdbjazhx2zvdhcbmrtuxs6f3iwnid.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2024-12-15 |
http://6stzturcvnli6ilm6f6vweiymchi6lboc62u7ive2q7hn5hbbbauvgid.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-01-05 |
http://6blfnoe24tfpal2kmacphkjmzph3oghjdznsgkf23lmvjqbtgrmedpid.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-03 |
http://5xmd7pwpk4flmz5o2hbyndpkles5klmwbpxbw4jitzjnbhn4wkdktvad.onion/ |
Screen |
Support Chat |
⬇️ |
2025-03-12 |
http://bf7dw4n6zne6rbgjlpcsidphpk753nkyubipkym5t4pntgfyb6clw2qd.onion/login |
Screen |
|
⬇️ |
Never |
http://nxarphaf35qp2uuosaq54m3a2s5kt4svpcv56mvz6r7xy6na7uo5ypyd.onion/ |
|
|
⬇️ |
Never |
http://bxi2cepk57dy3uhgwqd6dri6jtuqe7btay225rn6xkvvgnp2cvjvowqd.onion/ |
|
Welcome to nginx! |
⬇️ |
2025-02-13 |
http://2idvzxbwvzbxhuniw7kfaimcvtqazmn7nmuw7codg65cshwwsvnpz7id.onion/ |
Screen |
|
⬇️ |
Never |
http://xqsdbtrtmufdyiqnkrkvosec4gqappf2egcptzqppjtqdevsoadakyqd.onion |
|
Welcome to nginx! |
⬇️ |
2025-05-22 |
http://7o4vytbuk42nuucim5idwgsg3zqkocpllqpykmrdk6zvs75ne7iwgmad.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-07-12 |
http://zvdlza5tjyl33mbx4k7w7t25ve6e5c3ve3nmfwqlygl6ww6s4lmsu4ad.onion/ |
Screen |
Welcome to nginx! |
⬆️ |
2025-08-20 |
http://55gqddfwtzfcuxwgoz746tas2djoiai4lbjvc36kq55prehyvedee3qd.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-08-20 |
http://ybe6nbidsn6grrnhx5adksp2sd4cz7povuuszhmliir5p4th7inmexid.onion/ |
Screen |
Support Chat |
⬇️ |
2025-04-28 |
http://ws6uapok34o3uvn3v6nru574urlvlbn5u3pi2xzyg765vpv2fixcm4ad.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-07-26 |
http://6lrsxvqscxtznb4fhux5u3vbslbanxjzxzgtokjtfwaitxe4pfgfebad.onion/ |
Screen |
Welcome to nginx! |
⬆️ |
2025-08-20 |
http://4fklgnaegkdpfgaa3rxr3x4xujq4yi6dcuumxikrquzar2m3meiqxwad.onion/ |
Screen |
Support Chat |
⬇️ |
2025-08-14 |
http://j56wqkcxzvuz25wzypoxua3fex5zfuc3emkhw4bemtiuikt46dwma6id.onion |
Screen |
|
⬇️ |
Never |
http://vz4ybjdqhtm753rznnwx67elvzhbcdkqk24g3ytnq32h6qpirigkytqd.onion |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
NoEscape |
⬇️ |
2023-12-09 |
http://noescaperjh3gg6oy7rck57fiefyuzmj7kmvojxgvlmwd5pdzizrb7ad.onion/login |
Screen |
NoEscape |
⬇️ |
2023-12-09 |
http://noescapemsqxvizdxyl7f7rmg5cdjwp33pg2wpmiaaibilb4btwzttad.onion/ |
Screen |
NoEscape |
⬇️ |
2023-12-09 |
http://noescapemsqxvizdxyl7f7rmg5cdjwp33pg2wpmiaaibilb4btwzttad.onion/archive |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://lirncvjfmdhv6samxvvlohfqx7jklfxoxj7xn3fh7qeabs3taemdsdqd.onion |
|
NOKOYAWA Leaks |
⬇️ |
2023-01-25 |
http://6yofnrq7evqrtz3tzi3dkbrdovtywd35lx3iqbc5dyh367nrdh4jgfyd.onion/ |
Screen |
Wall of Shame |
⬇️ |
2023-10-08 |
http://nokoleakb76znymx443veg4n6fytx6spck6pc7nkr4dvfuygpub6jsid.onion/ |
Screen |
None |
⬇️ |
Never |
http://accurfjvcphjtfogx42gpmoobffwqpqzvv2mf7smr6no62fy7ootjnid.onion |
|
None |
⬇️ |
Never |
http://canarodqqttgf2ofv7rkj74jvani7f2ftrbkmuw7zwyydlxikazimyqd.onion |
|
None |
⬇️ |
Never |
http://chattms45un5jmh23dak7udp2vt3dp25rlifqszvrhx2mb2psieyybid.onion |
|
None |
⬇️ |
Never |
http://cnaaiic2skxbhnm35xmh3sohqgulpiyocj7yv7shrw4t34r5bvqbbayd.onion |
|
None |
⬇️ |
Never |
http://comcomtjphtjl5mrtguatt5rgi4hymyrnzpqi6faztwmt6kw5tczqyad.onion |
|
None |
⬇️ |
Never |
http://domaing5xpfmowjeah2z3icrxcbxd6e5mzk5gduohgzijrmm6lr3vxyd.onion |
|
None |
⬇️ |
Never |
http://eperfs2u7bnyzpavtje6ruuwzatpzexdbjejdijgmgbe7wjje7lmkqyd.onion |
|
None |
⬇️ |
Never |
http://frescayge2pa3epoytdocxz2vzagphzmrl6sqxrvrowftso4oqreh3ad.onion |
|
None |
⬇️ |
Never |
http://gaston333sywqydo4mudwjgbeieryqut4trd34kntirejrvwefp4wwyd.onion |
|
None |
⬇️ |
Never |
http://grsrobpx6t7j7eu4zi2xqm6fsrztaoptz4tie5xoamge6c3byeo462qd.onion |
|
None |
⬇️ |
Never |
http://guardxxhqcmyddgikmgmdjpljhgwo7s4p7nnfljo54ogjd5vpu2labid.onion |
|
None |
⬇️ |
Never |
http://hyundaiyo7kxalnkcghqpkfvapevwicis3ytnnue6xqivuvuvi5cnhyd.onion |
|
None |
⬇️ |
Never |
http://mruedu746yv2hnsfxwgglxpqbtlgfu7xwschm7w5cl2okanfjhu6vgad.onion |
|
None |
⬇️ |
Never |
http://modestorxo4s2vkjxo6xyue2lz7zefavtftb44apjojc5qhszq4dqnyd.onion |
|
None |
⬇️ |
Never |
http://msxiy2dutavkdwxbjge2lnut4x7ai4z2xb3ay324tqzxgryrhahbazad.onion |
|
None |
⬇️ |
Never |
http://muaedu3espka2gw5yqopmglslckonkeiduvymfkxjkggvtfqxkqydjqd.onion |
|
None |
⬇️ |
Never |
http://pea3gvx6uyywne2f4dokv5cznsvzcayxsroai2ehozffkd576xfdm5yd.onion |
|
None |
⬇️ |
Never |
http://pueblogmiocdtzj2of5556yzcl7frldcmqztxr6qcirgamzencolyhad.onion |
|
None |
⬇️ |
Never |
http://rcdauehrqqex6pghmphfqz2jpuro2guhyenkolm2wld6bez344cbvmad.onion |
|
None |
⬇️ |
Never |
http://roadiewfshampm6ee56olxymma7iwlhecjgekezmfviua5zv6vkoqzad.onion |
|
None |
⬇️ |
Never |
http://rwavdkltqjoi62kvugd5m576uyn4yrlxcpwril5simavxv7z6xrxrbyd.onion |
|
None |
⬇️ |
Never |
http://sabinwgf7aryxeel2ivx243tzymlsuk2s4lmrqnqn7hug5xecy6ob6ad.onion |
|
None |
⬇️ |
Never |
http://snodfytsyn25r2umgfbygj7gxvul7egr4yx4j4n4yn7nb7crabafzwid.onion |
|
None |
⬇️ |
Never |
http://stockkyjeldgtaj3evbtfb4id7jxnde6qnt6so3ndipcndykgknjlyyd.onion |
|
None |
⬇️ |
Never |
http://wcch72vqgvsgcv4ic3awnonoqgspum6p47m4thum52rbq4fu3ctu6sqd.onion |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
NO-NAME Blog Since 2020 – 2023 |
⬇️ |
2024-11-16 |
http://noname2j6zkgnt7ftxsjju5tfd3s45s4i3egq5bqtl72kgum4ldc6qyd.onion |
Screen |
Default Web Site Page |
⬆️ |
2025-08-20 |
https://www.lockbitblog.info/ |
Screen |
|
⬇️ |
Never |
http://7tkffbh3qiumpfjfq77plcorjmfohmbj6nwq5je6herbpya6kmgoafid.onion/ |
|
|
⬇️ |
Never |
http://lockbitvyq2uedft666b4ezxfvneq36jagpov4shitftjcoro7pjlsqd.onion |
|
|
⬇️ |
Never |
http://6qubpgkb7vjd6upivya4ll2xvzkx6zdj5bfwfo7qqm4jd3cuv4nwg2id.onion |
|
Description
Rebrand of RALord
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Update Links - Nova GBlog |
⬇️ |
2025-08-20 |
http://novavdivko2zvtrvtllnq45lxhba2rfzp76qigb4nrliklem5au7czqd.onion/ |
Screen |
Nova Panel | Login |
⬇️ |
2025-07-11 |
http://novazzitmugtbjwuttc5hhsemkmvwh3iyt27oeeunu5mkw62qpfeykid.onion/ |
Screen |
Nova Official - Nova Chat |
⬇️ |
2025-07-11 |
http://novaeogps7purkdhxmaymmnanqiwtqf3r3iu3we4khkzwegkoefbxnyd.onion/ |
Screen |
Update Links - Nova GBlog |
⬆️ |
2025-08-20 |
http://novav75eqkjoxct7xuhhwnjw5uaaxvznhtbykq6zal5x7tfevxzjyqyd.onion/ |
Screen |
Update Links - Nova GBlog |
⬆️ |
2025-08-20 |
http://novavagygnhqyf7a5tgbuvmujve5a2jzgbrq2n4dvetkhvr2zjg27cad.onion/ |
Screen |
Nova GBlog |
⬆️ |
2025-08-20 |
https://novatd4577pzlvdyy42slydhrhru7fpcflbbxlajcmbfrgzyeis6d3id.onion/ |
Screen |
Nova GBlog |
⬇️ |
2025-08-20 |
https://novag4k2te3mstt2xq5irywlpaw6edgkpiwgg4t2q7eecisj2qqtvbid.onion/ |
Screen |
Nova GBlog |
⬆️ |
2025-08-20 |
https://novaoddh3vxylxqpsfdjprliknbzgbkv6nkazpzu3cvykrgpyzuywryd.onion/ |
Screen |
Nova GBlog |
⬆️ |
2025-08-20 |
https://vctmy3tytuah2offux4bixzunh53pnepsnsrr2hly6blpgiewqodnzad.onion/ |
Screen |
Nova GBlog |
⬆️ |
2025-08-20 |
http://leak7y2247fj7dbb35rpfyxuyaqtwbshiwxp6h35ttzlhrxmhvi4fead.onion/ |
Screen |
|
⬇️ |
Never |
https://novazzitmugtbjwuttc5hhsemkmvwh3iyt27oeeunu5mkw62qpfeykid.onion/ |
Screen |
|
⬇️ |
Never |
https://nova5cr2op6uo73korzmzkvil2btj3erjaujwtbbvtpko3yx7ivq3myd.onion/ |
|
|
⬇️ |
Never |
https://nova25eabfdep76t52dt34n2qdrhrn7vxuaeitcy5x2ovxnut767bwid.onion/ |
|
|
⬇️ |
Never |
https://npnlc7i2mxnngj6angcj5pwesbaapksstqqez2qmtgmimezcpo4haryd.onion/ |
|
|
⬇️ |
Never |
https://raaskpzmkcoraswmzotjkzplq3aw6mcbogvd5uzbgsnhqb7az3ax2qid.onion/ |
|
Nova Official - Nova Chat |
⬇️ |
2025-07-11 |
https://novaeogps7purkdhxmaymmnanqiwtqf3r3iu3we4khkzwegkoefbxnyd.onion/ |
Screen |
Nova Official - Nova Chat |
⬇️ |
2025-07-11 |
https://noval3kb6snxuofmqmw2we3cvzci2tfknurgxi7gdyet55xh6zhno5id.onion/ |
Screen |
NC V2 | Nova Clouds |
⬇️ |
2025-08-14 |
http://ms5fasbpbfpbxmgtrhcspvg5ajmb2tpxdcg7x2wdd6equemuivqi5syd.onion/ |
Screen |
Description
A hacktivist group protecting artists' rights and ensuring fair compensation for their work.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
404 Not Found |
⬆️ |
2025-08-20 |
http://nullbulge.co/blog.html |
Screen |
Just a moment... |
⬇️ |
2025-06-24 |
http://nullbulge.se |
Screen |
None |
⬇️ |
Never |
http://nullbulge.com |
|
Error Response Page |
⬇️ |
2024-07-30 |
http://goocasino.org |
Screen |
None |
⬇️ |
Never |
http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion |
|
Description
AKA Lemon
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://ioot5g6iwj26tcowu4646qyijf2sgeddggoxgch5r3oovkh6gfco3sqd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://5mvifa3xq5m7sou3xzaajfz7h6eserp5fnkwotohns5pgbb5oxty3zad.onion |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Leaks |
⬆️ |
2025-08-20 |
http://orca66hwnpciepupe5626k2ib6dds6zizjwuuashz67usjps2wehz4id.onion |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Osyolorz Collective |
⬆️ |
2025-08-20 |
http://hackerosyolorz77y7vwj57zobwdeuzydhctz3kuuzr52ylzayvxuqyd.onion |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Incident ID e15dd788012dd8c15add053c411529ef5ae67fd8f69b93ca73f56b6c2ce2f2a6 |
⬇️ |
2025-03-13 |
http://oxthiefsvzp3qifmkrpwcllwscyu7jvmdxmd2coz2rxpem6ohut6x5qd.onion/ |
Screen |
Description
Pandora ransomware was obtained by vx-underground at 2022-03-14.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Pandora Data Leak |
⬇️ |
2022-05-03 |
http://vbfqeh5nugm6r2u2qvghsdxm3fotf5wbxb5ltv6vw77vus5frdpuaiid.onion/ |
|
None |
⬇️ |
Never |
http://pandoraxyz.xyz/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Pay2Key Leak Directory! |
⬇️ |
2022-03-15 |
http://pay2key2zkg7arp3kv3cuugdaqwuesifnbofun4j6yjdw5ry7zw2asid.onion/ |
|
None |
⬇️ |
Never |
http://pay2keys7rgdzrhgzxyd7egpxc2pusdrkofmqfnwclts2rnjsrva.b32.i2p/?i=3d1e4594aeb351854fcc800da08214a059ed16 |
|
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Payload.bin |
⬇️ |
2022-08-27 |
http://vbmisqjshn4yblehk2vbnil53tlqklxsdaztgphcilto3vdj4geao5qd.onion/ |
Screen |
Description
Payouts King Group. We are not RaaS. No affiliates are accepted. We use Tox messaging protocol.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Blog |
⬆️ |
2025-08-20 |
https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
https://v2mw3spxqhggig5zjd6tjnfamwntrprreij3dq77jlq74dduyjafeead.onion/ |
Screen |
|
⬇️ |
Never |
http://c6nrwsloenpiat7zilh243nvhe7a3edsfm3ct3kpxhu2fv7z36ksjcad.onion/ |
|
Description
ABOUT US:
"Pure Extraction And Ransom (PEAR) Team is the community of highly responsible and strictly disciplined members. We are a private team and have nothing common with any other threat actors. We've been monitoring this field for a long-long time. So, we understand all the processes and know well how it all works."
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
PEAR |
⬆️ |
2025-08-20 |
http://peargxn3oki34c4savcbcfqofjjwjnnyrlrbszfv6ujlx36mhrh57did.onion/ |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://yxwomyfmexm3bfcuumnugrzwluol5qwsw6pmne7jklgmzthkp35l2jqd.onion/ |
Screen |
PEAR |
⬆️ |
2025-08-20 |
http://pearsmob5sn44ismokiusuld34pnfwi6ctgin3qbvonpoob4lh3rmtqd.onion/ |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://etus2tmakckdlkyjpevoyciuao7er5fj3qm26aev3nch4fusptefiayd.onion/ |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://csxilwnl7orv6rwfjen5ye3tefk5shjtr4tysuykgxjsyngpvoqrvbid.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://petya37h5tbhyvki.onion |
|
None |
⬇️ |
Never |
http://petya5koahtsf7sv.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Ransomware
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
PLAY NEWS |
⬆️ |
2025-08-20 |
http://mbrlkbtq5jonaqkurjwmxftytyn2ethqvbxfu4rgjbkkknndqwae6byd.onion |
Screen |
PLAY NEWS |
⬆️ |
2025-08-20 |
http://k7kg3jqxang3wh7hnmaiokchk7qoebupfgoik6rha6mjpzwupwtj25yd.onion |
Screen |
PLAY NEWS |
⬇️ |
2024-12-30 |
http://k7kg3jqzffsxe2z53jjx4goybvxu3a557kpsqakpwi6mrvfgcdo55tid.onion |
Screen |
PLAY NEWS |
⬆️ |
2025-08-20 |
http://ipi4tiumgzjsym6pyuzrfqrtwskokxokqannmd6sa24shvr7x5kxdvqd.onion |
Screen |
PLAY NEWS |
⬆️ |
2025-08-20 |
http://j75o7xvvsm4lpsjhkjvb4wl2q6ajegvabe6oswthuaubbykk4xkzgpid.onion |
Screen |
|
⬇️ |
Never |
http://zi34ocznt242jallttwvvhihrezjdzfgflf3uhdv6t3z23hhcn54efid.onion |
|
|
⬇️ |
Never |
http://37wb3ygyb3r2vf2dt5o3ca62zlduuowvkkwjrtbcgc5iri4t6rnzr7yd.onion |
|
|
⬇️ |
Never |
http://eppsldmcnv3ylabsx5srvf36wnk6jrowg6x4unxclv55rnu4kf5436yd.onion |
|
|
⬇️ |
Never |
http://slg7tnjb65swwyaebnyymyvo73xm36hxwugdsps7cwcxicizyzyt2byd.onion |
|
403 Forbidden |
⬆️ |
2025-08-20 |
http://x6zdxw6vt3gtpv35yqloydttvfvwyrju3opkmp4xejmlfxto7ahgnpyd.onion |
Screen |
|
⬇️ |
Never |
http://eppsldmcnv3ylabsx5srvf36wnk6jrowg6x4unxclv55rnu4kf5436yd.onion |
|
Welcome to nginx! |
⬇️ |
2025-02-25 |
http://jnbiz5lp44ddg4u5rsr4yebbpxa3iytcsshgbqa4m6r6po5y57h6yxid.onion |
Screen |
Welcome to nginx! |
⬇️ |
2024-11-01 |
http://sm2gah7bjg6u2dfl3voiex6njh2kcuqqquvv7za37xokmbcivsgqcnad.onion |
Screen |
Welcome to nginx! |
⬇️ |
2024-11-02 |
http://z7u6dkys7b2aeibvklxga7mldzrepoauiuniqwfhdadkkwwgmv6bqhad.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-25 |
http://kri3lez34pbqra3xs5wxo55djldtsekol6tuqdjqecqzga6dpnjqruyd.onion |
Screen |
Welcome to nginx! |
⬇️ |
2024-11-02 |
http://iejj6bywviuecjwi3kxanzojqroe3j3phzgplvrdzcicimtcw6xgk3yd.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-25 |
http://xixkhm6inbg6t5642t2pjafsjsh3eaonpjysdcfvr3zvadlqb6nhryad.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-25 |
http://giix5r763sbxmu442tmwfb4thqbz4i5ppxcqsmnnlqnm2yiezv6epxqd.onion |
Screen |
Welcome to nginx! |
⬇️ |
2024-11-02 |
http://mokcrzbitq2gc5qcpxcbce43pawuthyaoazl6iz2xknj53ebyb4r4eid.onion |
Screen |
403 Forbidden |
⬇️ |
2025-07-04 |
http://gpph6awu7hqsmzmr5sihusjoscp3itwtk3b4i2chwspmka2ikuqcwaqd.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-25 |
http://v3r6g4q3b2jpqusznecxexr5aqi42vy5ts6jy6fu3strecvb5c2woead.onion |
Screen |
Welcome to nginx! |
⬇️ |
2024-11-02 |
http://4xo3cicwo2rhpwr6vkgwt7mqg4oiqihsmoxwlmklf4sjoatkdqjtmcyd.onion |
Screen |
|
⬇️ |
Never |
http://a4gbdvoorwn3tcqijoedvdeukqaqwc6t2kx4gh3gm37gv4p37evvzqad.onion |
|
Welcome to nginx! |
⬇️ |
2025-02-16 |
http://6jb5avmh6rvcb7vcux7kaivnzpqcrfg4ui4xv2co5vmspgrwll7lkkyd.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-16 |
http://doz7omlqqanryonvil4iuj65shzcv3efupqwubkza6553wnekrrd4uid.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-16 |
http://hbwsxlq3uzknabg2blt7d4mcbu24oriklji36zdqsz3ou3mf2d7bvoid.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-07-04 |
http://ysknyr5m5n3pwg4jnaqsytxea2thwsbca3qipi64vlep42flywx7dgqd.onion |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://b3pzp6qwelgeygmzn6awkduym6s4gxh6htwxuxeydrziwzlx63zergyd.onion |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http://p2qzf3rfvg4f74v2ambcnr6vniueucitbw6lyupkagsqejtuyak6qrid.onion |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http://whfsjr35whjtrmmqqeqfxscfq564htdm427mjekic63737xscuayvkad.onion |
Screen |
Welcome to nginx! |
⬇️ |
2025-02-15 |
http://v3zgtoh5etfeuvhtgdpiejle4mzy7gdvoygildytlxwoay6qvrkixfad.onion |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
PlayBoy |
⬇️ |
2024-10-30 |
http://vlofmq2u3f5amxmnblvxaghy73aedwta74fyceywr6eeguw3cn6h6uad.onion/ |
Screen |
None |
⬇️ |
Never |
http://ovcbyl77wplz67mdcilq6yq67eg56milg3xjehoiklbxrs4mondbklyd.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
PwndLocker is a ransomware that was observed in late 2019 and is reported to have been used to target businesses and local governments/cities. According to one source, ransom amounts demanded as part of PwndLocker activity range from $175k USD to $650k USD depending on the size of the network. PwndLocker attempts to disable a variety of Windows services so that their data can be encrypted. Various processes will also be targeted, such as web browsers and software related to security, backups, and databases. Shadow copies are cleared by the ransomware, and encryption of files occurs once the system has been prepared in this way. Executable files and those that are likely to be important for the system to continue to function appear to be skipped by the ransomware, and a large number of folders mostly related to Microsoft Windows system files are also ignored. As of March 2020, encrypted files have been observed with the added extensions of .key and .pwnd. Ransom notes are dropped in folders where encrypted files are found and also on the user's desktop.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://msaoyrayohnp32tcgwcanhjouetb5k54aekgnwg7dcvtgtecpumrxpqd.onion |
|
Description
Ransomware written in .NET, apparently derived from the codebase of win.hakbit (Thanos) ransomware.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://promethw27cbrcot.onion/blog/ |
|
None |
⬇️ |
Never |
http://promethw27cbrcot.onion/ticket.php?track= |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
end or a new era? |
⬇️ |
2025-04-17 |
http://c2mdhim6btaiyae3xqthnxsz64brvdxsnbty4tvos65zb565y4v55iid.onion |
Screen |
404 Not Found |
⬇️ |
2025-04-17 |
http://c2mdhim6btaiyae3xqthnxsz64brvdxsnbty4tvos65zb565y4v55iid.onion/b/ |
Screen |
404 Not Found |
⬇️ |
2025-04-17 |
http://c2mdhim6btaiyae3xqthnxsz64brvdxsnbty4tvos65zb565y4v55iid.onion/blogs.html |
Screen |
嘉茗轩旗下平远信息网 |
⬇️ |
2025-08-19 |
http://pyrx.cc |
Screen |
Description
Mespinosa is a ransomware which encrypts file using an asymmetric encryption and adds .pysa as file extension. According to dissectingmalware the extension "pysa" is probably derived from the Zanzibari Coin with the same name.
Links
Page title |
Available |
Last visit |
URL |
Screen |
Pysa's Partners |
⬇️ |
2022-02-21 |
http://pysa2bitc5ldeyfak4seeruqymqs4sj5wt5qkcq7aoyg4h2acqieywad.onion/partners.html |
|
Description
Aka Agenda
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Qilin |
⬇️ |
2023-02-17 |
http://ozsxj4hwxub7gio347ac7tyqqozvfioty37skqilzo2oqfs4cw2mgtyd.onion/ |
Screen |
|
⬇️ |
2021-05-01 |
http://24kckepr3tdbcomkimbov5nqv2alos6vmrmlxdr76lfmkgegukubctyd.onion |
|
Qilin |
⬇️ |
2023-02-17 |
http://wlh3dpptx2gt7nsxcor37a3kiyaiy6qwhdv7o6nl6iuniu5ycze5ydid.onion/blog |
Screen |
DDOS Protection |
⬇️ |
2025-05-10 |
http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion/ |
Screen |
WikiLeaks |
⬇️ |
2024-07-09 |
https://wikileaksv2.com |
Screen |
Qilin blog |
⬇️ |
2025-08-20 |
http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion |
Screen |
|
⬇️ |
Never |
ftp://dataShare:nX4aJxu3rYUMiLjCMtuJYTKS@85.209.11.49 |
|
|
⬇️ |
Never |
ftp://dataShare:2bTWYKNn7aK7Rqp9mnv3@188.119.66.189 |
|
WikiLeaks V2 - New Version of the Legendary WikiLeaks Project |
⬇️ |
2025-04-18 |
https://31.41.244.100/ |
Screen |
|
⬇️ |
Never |
http://ijzn3sicrcy7quixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvad.onion |
|
|
⬇️ |
Never |
http://kbsqoiyihadmwczmxkbovk7ss2dcynitwhhfu5yw725dbogo5kthfaad.onion |
|
|
⬇️ |
Never |
http://ftp://dataShare:nX4aJxu3rYUMiLjCMtuJYTKS@176.113.115.97 |
|
|
⬇️ |
Never |
http://ftp://dataShare:2bTWYKNn7aK7Rqp9mnv3@176.113.115.209 |
|
|
⬇️ |
Never |
http://ugefls6xolqo6anb6jydjtwqbr5h3st2stfo6j4or2hp7ak5zypwq2yd.onion |
|
None |
⬇️ |
Never |
http://ftp://dataShare:2bTWYKNn7aK7Rqp9mnv3@185.39.17.75 |
|
Login |
⬇️ |
2025-06-09 |
http://6d453sm6732jpr5gjs6zrjzysurnmrwi67624goptyly2xuz2kmjixad.onion |
Screen |
None |
⬇️ |
Never |
http://ftp://datashare:C}^SLA"5Vl?vX#R4tg^}:hd3@185.196.10.52 |
|
None |
⬇️ |
Never |
http://ftp://dataShare:2bTWYKNn7aK7Rqp9mnv3@185.196.10.19 |
|
Login |
⬇️ |
2025-08-11 |
http://vn2untbh4etoqoc4rfsrzlautth7vm62swv7ohemsy4tgh3a4j5ykgyd.onion |
Screen |
Login |
⬆️ |
2025-08-20 |
http://p2zg4yqlsflg77opdzcjiu3reyj3wx2owwez2tcyv3vemmz7wbyccyqd.onion/ |
Screen |
Login |
⬆️ |
2025-08-20 |
http://ytdfc3dvgudgq4zyjwtipzbsu7arbiqvygfqdyqiygkvry2hy47oq2ad.onion |
Screen |
None |
⬇️ |
Never |
http://22odvea7bampzr7k2dztbqda67fpau6hcy7sgn2npucaz5gcjmmzrgqd.onion/ |
|
Sign In |
⬇️ |
2025-08-12 |
http://ji57fr53anp7wb44tbbnp72qcgbhqywy4jmbncawdcrejj5amuvh3zqd.onion/ |
Screen |
Login |
⬆️ |
2025-08-20 |
http://z2rmyu57rkmlsfif4lovlz36ph7lxmjiawilmeryfoupwnbuplm4suqd.onion |
Screen |
Login |
⬆️ |
2025-08-20 |
http://djixgstarlzvmqsqcewlsfxlqzwd3i2eqs24mccfrfvrhqihjmssahqd.onion |
Screen |
Login |
⬆️ |
2025-08-20 |
http://zlubnjgvsf6ifxswnvpfgvp36tlzubzggn4txk5mi5qgt377ytzai6yd.onion |
Screen |
None |
⬇️ |
Never |
http://ifjnyofk7xpdrqzp3pgyorwgoyrxjkjic4aqxcz4sjxjhbpewfoxngad.onion |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://securo45z554mw7rgrt7wcgv5eenj2xmxyrsdj3fcjsvindu63s4bsid.onion/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2024-07-23 |
http://62brsjf2w77ihz5paods33cdgqnon54gjns5nmag3hmqv6fcwamtkmad.onion/ |
Screen |
Description
login page, no posts
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2022-11-08 |
http://gvka2m4qt5fod2fltkjmdk4gxh5oxemhpgmnmtjptms6fkgfzdd62tad.onion |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Quantum Blog |
⬇️ |
2024-01-16 |
http://quantum445bh3gzuyilxdzs5xdepf3b7lkcupswvkryf3n7hgzpxebid.onion/ |
Screen |
Quantum Blog |
⬇️ |
2024-01-16 |
http://quantum445bh3gzuyilxdzs5xdepf3b7lkcupswvkryf3n7hgzpxebid.onion |
Screen |
None |
⬇️ |
Never |
http://26gzvue4vlgxuiaaotxl3bbdepuf55sdrsailywbrc7kdrcgwo62ghqd.onion |
|
None |
⬇️ |
Never |
http://275dg33wjetp6arghjtp3d7265nsknx2heho5n6bqioy2ehl7c3i3iyd.onion |
|
None |
⬇️ |
Never |
http://2gknqtqreqfoedfd3sey4vqgp7fhc4xyagtj6yl3pz6swkliuakfx7ad.onion |
|
None |
⬇️ |
Never |
http://2k5qdebrbzv2uj2xz25f53bhjyqgmv2vixyy7p3vaeeb2bqz6jhnalad.onion |
|
None |
⬇️ |
Never |
http://3uzycwcxrccpvrwx43mpr3gxwcqqgu4x72kedws6zuolp45gopjrzqyd.onion |
|
None |
⬇️ |
Never |
http://6kkjbpmqavf2nvs33furf3hywg2z4e4zrnwnmzegcpq4atfyp3jilnid.onion |
|
None |
⬇️ |
Never |
http://77jtf3wyb4rtsemeodl6h3hfblhgwj32ex3r7ywigg5mzfaqf7w5x7qd.onion |
|
None |
⬇️ |
Never |
http://7qlb63hy45ijihaeal26uyoms4r33dlrg64dr7ry7blnzhhwhov6jsad.onion |
|
None |
⬇️ |
Never |
http://7sqjgyldxtur4p3nkpdzacldqonnovklnibxhz4y6saremsrmh6vf2yd.onion |
|
None |
⬇️ |
Never |
http://agxyd52t6tfoahsvi6mfk7nqwpoe2xj6wp75vnv7ffrfxg5vtw6guxid.onion |
|
None |
⬇️ |
Never |
http://b2rt3dmb62jo62e2rr5rfrpyomka477tjkcni2fsamjd3wksolae5wqd.onion |
|
None |
⬇️ |
Never |
http://bfdwhgjey6xb25e6pc6i7upnswh4znqwwnmlmgzapiwfmt7ugzcwvyyd.onion |
|
None |
⬇️ |
Never |
http://bi7v6o5djhfji22usugjzpk26nvvwugaubrf3yypyvmkzw7su2nad5id.onion |
|
None |
⬇️ |
Never |
http://cee77a5wsey5vohubq76en4bgsqbdrasito3zn7ziu5vouhbzxtx6syd.onion |
|
None |
⬇️ |
Never |
http://ct7jsq3dbwcvcafnwli7tfv2pf62y2rfhos4a66gu7twqkcclkih6wqd.onion |
|
None |
⬇️ |
Never |
http://dblgdn4manmaiewnsqa3vgm26v7ujtx75wtev5pyfmtpww4ofqrqpiid.onion |
|
None |
⬇️ |
Never |
http://dw6sy3pt54fh6d3yo4wpb7qjtwdlyyi3qd5oabdwlmlmuyhsxvnblvqd.onion |
|
None |
⬇️ |
Never |
http://fjlprvuqzs6h4ielcdkmof5nju3ent7c34esaptm7677xono7osvp5yd.onion |
|
None |
⬇️ |
Never |
http://friazjtqhznoknwi5354lnkwa4lhgjti74l4asfhsjeoe5dulwitpcqd.onion |
|
None |
⬇️ |
Never |
http://k2j6llaw66bvlgxcy67uj2prdqqzbl7aj46wab4mpdyizpmati55kfad.onion |
|
None |
⬇️ |
Never |
http://leqg2fthiage4ockldnf7trwdx3bvehni7vjf6wbwsitnbjtotbv3nid.onion |
|
None |
⬇️ |
Never |
http://nugus3xk456m3xhokm2q5zusujhqodirm5vfke6jmsej2jy6sgbn4oqd.onion |
|
None |
⬇️ |
Never |
http://nxvvamxmbdn3latdplq6azgeeuieaek32h674nl6lzavcod2f2obvxyd.onion |
|
None |
⬇️ |
Never |
http://ohmhgcrvte6aftgnm5lefq7ztannicarzo6lus2bih3zg6ugklf4tsyd.onion |
|
None |
⬇️ |
Never |
http://oyjydoka32xa24doeymhq4thoibxqdd7i7hnngojpycd74frggkvhyyd.onion |
|
None |
⬇️ |
Never |
http://q45frho6hatxtx7qxjytt4cswinakvc2h6iag65jlsaws32xdzz47kyd.onion |
|
None |
⬇️ |
Never |
http://rrmywkltwjpntybqj7migd5ibdzzxulnhgndb6dnoe6unlljslqb7lid.onion |
|
None |
⬇️ |
Never |
http://uwr2mmcqtroeyu6bzgivwwzdcpe2a4e74r2srlzveyltsi57n5bnsbqd.onion |
|
None |
⬇️ |
Never |
http://wcmxtfzde2hmhsreqgflwvkawmyfvuyqcebuq5w5qj3rllo2jpb4l2yd.onion |
|
None |
⬇️ |
Never |
http://wly4qu4q6abduzwm7ryai4ehysgnk5f25v6ddofcyuasbfntwnqjkcid.onion |
|
None |
⬇️ |
Never |
http://x3djueexuhivjtdj5udkjzfsm37kiaoeqy5ywluljbfsf2wsuom5yyid.onion |
|
None |
⬇️ |
Never |
http://xrjwgvn3sv75zrcmfdarz3futzx54uyy6o6si5pj5phhee3nlokkopyd.onion |
|
None |
⬇️ |
Never |
http://yizydlt5rl6br3qihvjdgfsprrq2ealnoq2eg6koqs6yv47d3byucxqd.onion |
|
None |
⬇️ |
Never |
http://zes5libwlgrfnttkpgtbimbixyb4t6k6rhuxhayzq76j7zgxqt64piad.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
RA World |
⬇️ |
2024-01-08 |
http://pa32ymaeu62yo5th5mraikgw5fcvznnsiiwti42carjliarodltmqcqd.onion |
Screen |
502 Bad Gateway |
⬇️ |
2023-08-25 |
http://hkpomcx622gnqp2qhenv4ceyrhwvld3zwogr4mnkdeudq2txf55keoad.onion |
Screen |
RA World |
⬇️ |
2025-02-10 |
http://raworldw32b2qxevn3gp63pvibgixr4v75z62etlptg3u3pmajwra4ad.onion |
Screen |
RA World - RA World |
⬇️ |
2025-02-10 |
http://raworlddecssyq43oim3hxhc5oxvlbaxuj73xbz2pbbowso3l4kn27qd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Rabbit Hole |
⬇️ |
2024-04-12 |
http://z5jixbfejdu5wtxd2baliu6hwzgcitlspnttr7c2eopl5ccfcjrhkqid.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
radar.ltd |
⬇️ |
2025-07-16 |
http://radar.ltd |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2021-05-01 |
http://rgleak7op734elep.onion |
|
This site has been seized |
⬆️ |
2025-08-20 |
http://rgleaktxuey67yrgspmhvtnrqtgogur35lwdrup4d3igtbm3pupc4lyd.onion/ |
Screen |
|
⬇️ |
2021-05-01 |
http://p6o7m73ujalhgkiv.onion |
|
|
⬇️ |
Never |
http://2dxxyil6kur3qpht2tkklupdgacrcbfun6qf5jmk3hafmt6n6ockbzid.onion |
|
|
⬇️ |
Never |
http://goh2zbohdiblk23scvtae7delci5cioy73la2lnrduxutxksl7xiscqd.onion |
|
|
⬇️ |
Never |
http://t2w5byhtkqkaw6m543i6ax3mamfdy7jkkqsduzzfwhfcep4shqqsd5id.onion |
|
|
⬇️ |
Never |
http://wxbpssv4hiwlcgt4cxam3cznu4feqgf5pqfibbku3x6dwvtcakdkyeid.onion |
|
|
⬇️ |
Never |
http://xxbsnxdqmthgpydddmuvg7yzy6pdfnlnlepxa5my4mjiqjsee6yidhyd.onion |
|
|
⬇️ |
Never |
http://7twfgaqyik3xfuu4.onion |
|
This site has been seized |
⬆️ |
2025-08-20 |
http://ragnarmj3hlykxstyanwtgf33eyacccleg45ctygkuw7dkgysict6xyd.onion/ |
Screen |
Description
According to Bleeping Computer, the ransomware is used in targeted attacks against unpatched Citrix servers. It excludes Russian and Chinese targets using the system's Language ID for filtering. It also tries to disable Windows Defender and has a number of UNIX filepath references in its strings. Encryption method is AES using a dynamically generated key, then bundling this key up via RSA.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://wobpitin77vdsdiswr43duntv6eqw4rvphedutpaxycjdie6gg3binad.onion |
|
Decrypt Site |
⬇️ |
2021-08-27 |
http://sushlnty2j7qdzy64qnvyb6ajkwg7resd3p6agc2widnawodtcedgjid.onion/ |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
New upgrade for Brand |
⬆️ |
2025-08-20 |
http://ralordqe33mpufkpsr6zkdatktlu3t2uei4ught3sitxgtzfmqmbsuyd.onion/ |
Screen |
New upgrade for Brand |
⬇️ |
2025-08-20 |
http://ralord3htj7v2dkavss2hjzviviwgsf4anfdnihn5qcjl6eb5if3cuqd.onion/ |
Screen |
New upgrade for Brand |
⬆️ |
2025-08-20 |
http://ralordt7gywtkkkkq2suldao6mpibsb7cpjvdfezpzwgltyj2laiuuid.onion/ |
Screen |
Nova Panel | Login |
⬇️ |
2025-07-11 |
http://novazzitmugtbjwuttc5hhsemkmvwh3iyt27oeeunu5mkw62qpfeykid.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion |
|
Log in | RAMP |
⬆️ |
2025-08-20 |
http://rampjcdlqvgkoz5oywutpo6ggl7g6tvddysustfl6qzhr5osr24xxqqd.onion |
Screen |
None |
⬇️ |
2021-05-01 |
http://ramp4u5iz4xx75vmt6nk5xfrs5mrmtokzszqxhhkjqlk7pbwykaz7zid.onion |
|
Log in | RAMP |
⬆️ |
2025-08-20 |
http://ramp4u.io/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Rancoz | Blog |
⬇️ |
2023-10-17 |
http://ze677xuzard4lx4iul2yzf5ks4gqqzoulgj5u4n5n4bbbsxjbfr7eayd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://ranionv3j2o7wrn3um6de33eccbchhg32mkgnnoi72enkpp7jc25h3ad.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://sewo2yliwvgca3abz565nsnnx3khi6x7t5ccpbvvg6wgce4bk2jagiad.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
RansomBay | Went on a journey... |
⬆️ |
2025-08-20 |
http://rrrbay3nf4c2wxmhprc6eotjlpqkeowfuobodic4x4nzqtosx3ebirid.onion/ |
Screen |
RansomBay | Went on a journey... |
⬆️ |
2025-08-20 |
http://rrrbayguhgtgxrdg5myxkdc2cxei25u6brknfqkl3a35nse7f2arblyd.onion/ |
Screen |
RansomBay | Went on a journey... |
⬆️ |
2025-08-20 |
http://rrrbaygxp3f2qtgvfqk6ffhdrm24ucxvbr6mhxsga4faefqyd77w7tqd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Ransomware - Control Panel |
⬇️ |
2022-03-03 |
http://u67aylig7i6l657wxmp274eoilaowhp3boljowa6bli63rxyzfzsbtyd.onion/ |
|
None |
⬇️ |
Never |
http://cartelraqonekult2cxbzzz2ukiff7v6cav3w373uuhenybgqulxm5id.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
offline |
⬇️ |
2024-08-12 |
http://gg6owuhu72muoelkt2msjrp2llwr2on5634sk5v2xefzmobvryywbhid.onion/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2024-06-07 |
https://ransomed.vc/ |
Screen |
404 Not Found |
⬇️ |
2023-09-08 |
http://k63fo4qmdnl4cbt54sso3g6s5ycw7gf7i6nvxl3wcf3u6la2mlawt5qd.onion |
Screen |
|
⬇️ |
2024-06-07 |
http://f6amq3izzsgtna4vw24rpyhy3ofwazlgex2zqdssavevvkklmtudxjad.onion/ |
Screen |
None |
⬇️ |
Never |
http://g6ocfx3bb3pvdfawbgrbt3fqoht5t6dwc3hfmmueo76hz46qepidnxid.onion |
Screen |
Description
RansomedVC2 aka RebornVC aka RansomedVC (rebrand) under new leadership.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
RansomedVC | Blog |
⬇️ |
2025-08-19 |
https://ransomed.biz/ |
Screen |
RansomedVC | Blog |
⬆️ |
2025-08-20 |
https://ransomed.vc/ |
Screen |
Description
RansomExx is a ransomware family that targeted multiple companies starting in mid-2020. It shares commonalities with Defray777.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
RansomEXX v2 |
⬆️ |
2025-08-20 |
http://rnsm777cdsjrsdlbs4v5qoeppu3px6sb2igmh53jzrx7ipcrbjz5b2ad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://zubllg7o774lgc4rdxmfcfpjewfkqa7ml7gxwl5fetogc7hbkvaprhid.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://jbdg4buq6jd7ed3rd6cynqtq5abttuekjnxqrqyvk4xam5i7ld33jvqd.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-07-19 |
http://rbx2hfyej6sogivjtw2z2xkcqwgtiy653ap5jylggsrj6glbmfr7axqd.onion/ |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
©RansomHouse |
⬇️ |
2022-09-30 |
http://xw7au5pnwtl6lozbsudkmyd32n6gnqdngitjdppybudan3x3pjgpmpid.onion |
Screen |
©RansomHouse |
⬆️ |
2025-08-20 |
http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://q2injs6dqvzemu2kkfpk7u3lsrcn4rddip3h2a7oc6uqwq6vjnduamad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://b4k2fi62ctrid4k73itusuvcz5x5yczk27bpqdrsvwu3nl5mnz5dg3id.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://gfkngfw25qwhd2sn43x7cflcehk3bb7v2uifjndr2sc3k2abhqs22rad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ge74uts2ybu22kzwahiayovxelbq5fwhywl73agev5w4fef2e5ikplid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://xlirefmk3w2gsk3n5mkddinbfdatk6lhi7fj36knubhtoxiaqyus44yd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://q2bwuip5xq4qjn2vyevprcddhk26cigyqfqfu6yki7korjys2rposaad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://nuhnnxg3owawo36mwdffyblbzplhthfswny55mh7yhbxq74en6jihyad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://m7vtnbsgctdcsccqmpnmi6igg3pcuiliqqqsq6uonkzg4blpa4eysiad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://vopa354z4toilkjn4ileaf6rinkzn2givaokvj4yguq5kbiqoulxnzyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://helc2q6kbiyz4cwegzlp5anigkbjsbowjxrjxv3j27rjbvycgr2qd2qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://aw5q5nzdok52cgprlzik4n44qstoajrlbixqqukqqcennjyas4x4opad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://bffujdbkhxfs2y63haztye4txuqgbkttmtxuxzkrlnruyioak5aoohid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://swnoxbuqfh7dmbqzaigqllkkljspipnvft3a4offxh3m5zwxg6ob46ad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://nw4f4x2gix7y7y3nizwj2fnf5u4tqy2mwej62r6tdqye4s5ogrtftuid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://pnhyueueqsog3gbjuq3o7ixqbcdctpqnzv4uujsg3j76nt2bsm2p3rid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://oujq7kjgzj4r3fyvsb2wtz6bxycrvawqdtj6zqgljw7u4hwqsak34jqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://jjgql4ddcs3hk5ptmfrpjriplialbjwi5a4tekffbfzv6n6oj5bmklid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://hyinn53atxthbme4n76ry76jiaohqd6uk35jwni32g6dqtqkaejgquid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://3nr2abdugd4mqabdmhialw3nbhol2qpywsphkocrhp6f7yxp3cps5iad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://blofpgq5q3talt3y2w3y6r3focrtrk7ugmwl3e6a4pjuf5t2tivkxbqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://t7ezcjqq7h24gwswhyde72x4gkqxsjeyt2fxz44kcls6ipm4wd6bmsid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://57yqe2tksgsmmwaqrxf45uaqy45t3hxu3dcnywjdks6lhtfztkpx57yd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://uvl645c47e5bozdzrrtjtm6pea5oltef63tsewz5ucmubvsj5i7meiid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://omdcwhef4ztuwhdiv3dbcgz2iyh2yb3gkkbusgvegbyjcacctahpxryd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://uv4sykhrapb2t3mnhw6imkbdym4fh6vstwcdsvbtzrvdwzcd5zzlylqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://7yrwf73tckb4mtt2kms4qc7nr7rzghu3jdzycm4w4qq2nwrybi7hq7ad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ggyosmcjq5vw7qimqhn2bf2gbr5zhdqmrfl35nnki6q5dmvblcqsmhyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://rfbka2dt27wyuzymonzzx2zeaohx7sejti4gpihhc22hv74hya4h4vyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://lpx3qaviraf2k7uozkf2qi47beenvt4dwyr2f3zgdwjglyywhtikiead.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://oplhizp4lkdxmrydoz4ixngotsqialrexmuficduihuktq4777tlb3qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://kd4zqe5ao4wio7shv747uszayc2xtpvoxirs3pnm7nrld5462jzf43qd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://cdalrbmvj36y24xbejqxgg6htzcgrbyf52ikoqgjwxvf566uycawa6id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://agx3kdwbkrff5csgkuf7rl3uytbgraqyb5kmr2ltp7pnza4puxgsyeid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://bqj4qln6jluwlsa32qjen2wlpgnqold4hgpkxny4x3vtsiecvdphwtqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://scuj56wenkc4oltbf35mxjqprwpyw7hfy4pwfwb54nfjs2ukemfodnyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://4bzbm2ifa2hffdb5celerb43mdbqoi6hcso3b2y4b6stdiiu2dww5bqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://cwiukccdpixacamo24wkdkv4pgu62xtnbfuvauvqr5zjcr4jg2w4dcyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://j3pbdpnbkib7evm4rhzq64vdxqd3tfgr2x25v65hfefmlukah5nfpeyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://mc2pt7cfb4p3xojzsmyzt2pe7chobgkbddpdqxdscks6ttbki77xl2id.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://cxkk2csneiefspqrv75vw5766sw56t67tluuekk6mm2k4f7vagh7qbyd.onion/ |
Screen |
|
⬇️ |
Never |
http://74zmq5sfydbci37dwwqd3ybkosw7wsuq5ymmc3fvyely45mtkvamh5yd.onionn/ |
|
Index of / |
⬇️ |
2025-08-20 |
http://uiw34f2i7x5lz2l2r33a23h3q5h3dzvrmwyz5m65uwdgkdkappn7jkyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://3vl65cye5nopltxxds73drcjddfq5wxwc2o5sm2rq3gddbs3ce7vn5ad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://dj7ww4rxmvy5vsqxqn557p3nzjmt64q4fg57tteono6ezzm3nsmhgpad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://texnb5y3cjaf2srwfjkafdzznqc3idjlncqiiobhq4yzlqw6sgvbljqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://otxn2ad3ypniexesajgomjnpwbkdjdit7uii2zv5v4c4u76r2rnlrtyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://zabhu2tvl3elihuccjzl4n35m27smgyxc5zkbgz3rcewjn6tjt2ihiad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://vxpudlncob2ouf6pnic5khdwdb3j52ersb636c4xm3s2p2wxg6vyi4yd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://kcikcoor63fa4qw6gx7yp2jxnvxbsxxdwd2znz72izt74rpdjfha2yqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://5aidibsmc4wt5l3lw4k5wtfqopbckllb3pntw7xw4qiem4a3eeacrlyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://atpimkcvvlvyizwazff6r5ioq6nnb7txijdwvlq4i6d5b7adx6c5egyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://xf7e5nnpiemhu6lpb5f723i4amgshhj33ny6c5ctbdjtc5duwtortoad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://pol7t4rw4dymnyruiqkckbeul2xxntn7x3sek3yw553pxbwag3n4eeid.onion/ |
Screen |
|
⬇️ |
Never |
http://ondvd45cnciqs7fzu5ewm5li2ib75bppxjaapcyilceauq5xpmzbswad.onion/ |
|
Index of / |
⬆️ |
2025-08-20 |
http://mo3nqtrrrvguce64bvenu25uciry7buw2hzke4wxm22jhr57zmsj65qd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://py5fgtglinssndrkrnbwgwjzxlsxl5zbyr3ypdiijgsllht2smznwpqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://jv2txdk66t6ijaugve3kte67yuahfaebrivy4okuqqvriaagsvi4pgad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://enppltlenqakx4lyekcz5xmlhybemrii7l4gjnijs2mqvwr26jp73fad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://gxru2ucw4yxkicwdiee6wpqwkogh2x3scfcnhcgb4lcyo4uid44734qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://pi25hxaofhsoxjh5g4e6iqcasoynlwygevqkbemzaalkyxwpgk77tqid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://uzf4tt7buqhj5xzb7jnnmsd4wtufua4qyzjgjf4sn2vwniiqz5oi5lid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://ftgvamayqmlyjkpf3dosoyfafbfpxxtxagsnt45sqauulckwupr2guid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://lxgnxg3cdv4uq2ps4e5i66bykvol6rw7bsvr5chdpksusiqwhyx7cxqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://hqvcotd73c6hjfc3ogukvc37jgs2krmowyposqudq2rodtawmatxpyad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://77k3qrvleqx3jn5mx73fpmhcfpk3pdrjs7tkgaxcsf4ojgizfhvmlhid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://lejfkugm7arhigu2vhtcursl564e73gjrq23upuaccuafbj73rgbnfid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://7kobff7iod6tmnyjgoqc4o367ufky2cvda4knnlvo2hakdzy4v4gffqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://obrze5nyt6pmx4ptffqliah7hxqb3je6jlghg7ynoy653nqvye43koid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://tgcj6ad5dqmuayc7ldm3zw4bz3hx45nf54oe7vqtfs4hai4wsgbnseyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://4sw54rh5et4adx7oj6sl2kqkra243dq3dyhlxmoyt7vez6vncufv2gyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://oxbwvjzd2oc4cb4jkrnpwbuvabyj2pgmoh6q73jsuq35skfbta3p3uad.onion/ |
Screen |
|
⬇️ |
Never |
http://vksaeydmtcfee2qiwbdxb7lijqtwxzy55g4ft72vjvmjvxyuppskdwad.onion/ |
|
Index of / |
⬆️ |
2025-08-20 |
http://4s2org6ns4uhmamkr2tshq6f6auusktjjdoo23rskwhxfdlxlnx5rnyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://4dmex5fuyap32y6lkpglp5cy3ivoua452o57cezsxhfdlnhgvlw6sxid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://m5ubrfq5bgwcckdxb3g3fcughlfntzv6kcvhw7bdkqsx7johtljefaqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://zlwljlbtakummd6biufuvljgqwbpvmrftd5kjtzxwjtn27jdzeahm5ad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://tbgdp3msmgiddu7yhdo2fsuhlaggcoj3oez7wdmofznqm4dhevpekeyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://yiqfcld3loz7rh4kcmxrf4azyeqa7sonfyxqlnjjbxmmfxhzbm2vsjad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://jhtym7doz6dt5xdq4dd5wuhmyaa6dtesv4lrnasb5scwofguffiewcqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://zdgj7z7dhmn5xgtrj4wh4gsf35hzst6blunfm3xf5iqpq6msiluxmmid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://2yce6tllc6xin4kucqr4aynscfjsg7l7pgz3pv7rat5o3vjeruxpknid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://xbpdja46coptbjt4a62lintyk547q54k7gubekbtsyqxivie4vln7syd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://4hmvksa7vw5x3mytrguzcjxvj3alfbapxaekudmiigpztqxxv7dynnqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://2ynd4lgi277los7ykngk3my3rx3ehitx4agrpomrilwjic4iqisbikid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://qiu5vqx2k3oyq3aeyz3pieh6g6yjzo7l5zofidxfvnahy3vgb2vuy6ad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://gomf6ssy2bgsxlfbawncxdydwa4m76i4gzbwusmdwepuamx46uu6eqyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://fmrsmdsuokgzj5oujoqcod23gnvkqptg3vzbcqz6vw2ci7gonigijuyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://374ydckkglmslkqy3coatm5nn2rk3hg43lgci4wrhizhr47zfyfbdead.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://7izw24yz3udwtvfoq4lshv2ibow6jahx4lojoxsdt2nkqzzpr7osoxad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://zz7ez3cgy6o4eehu5bc2cs7t4jvq7j7duragx3pfrgnafxui7l2ybzqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://kp5amzgfhwmpn26vnmx7h445x4xb7ofaxitonovt6mlewq5bpawkq7id.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://x3rx5uqoohqzfcnq3neiqwunb6eh5yc4ybu26nxwqqltclkvdvwbprad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://2f7k6jhxwbpiyuomb27eywzollahlje2xph3t5wckupkoeluantatbad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://tlr5h3my4jyvwgmyrvu2oadls2o3f377cz2bqnu3g7oaycofiweqjfyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ib3ru7m66tg37w6o7zxe4upntw2p7236c63wb5n3beeapiuor535vhad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://rivdgsucnasob3iiux5j4g4ybqz6flxgx2vz4h6i2wfu42hbbmwwcuqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://dfhu2iceszxurn7lf5mb5xhainmb7vulpizncjomtn4w5j5cv3pz52qd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://2ntyvlixm5zzhn2zgowgbbu5s6forpttomntefg5dapivr5qwokkyvyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://uax2s63op7lboqhuxscjfiwcea4retnus6z2ph33cd44dyqdsyosj6id.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://w6kf2ktnbzx3hha25snxdwg57ydqdskzcs5tdrdztajb2vn7jk5hzrid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://vokr3ancppaevval5hwpqpm43szyj7nysfoxqfsrc274jabs5m2227yd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://mdpkohdcvgyiexi4yihiufdi2wmau5yd6wjr7rituvwntifxuh43deyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://iwtkvmhwx7g743ytqj6yiibbb33a3ycezssyn6gai2hny7b2ynez6sad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://uiecrea6byqjfppofxjcku2rjs6qxeqblnc7ljveopbtd4ih635saiid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://n7f7ic7islqbyw3vzans3mddgaooirbf4i75tvsfvxjvni7vxanwczad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://utijlj5t2xamyekjr3ur7vpdnttaqit57fher2nzibih3nqil75jhjyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://lc6wrbsdvaayqkhj47bjkj7mfnaiyvsnufmdnkhai6de3uxhu6bssgyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://nxml7szv4m3hd6gtjjg62xejyusbbqvmb3thfwaa6wimablrzuk7p3qd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://jt772jtwpfrluifvz34ti43kfgv6lz7bgiviwopl73slo6a3wetch4yd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://2xipgq7vsu6d6llgg4tr4wxwdc5tbmmtx3jxfax3kx2dorkcnzsimwqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://d7akeguwmrxmrg7tgzx7a73mksq3zpcjjk2c4jibfhmvrhhd6oprsfyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://ozokx66qqmtvjbkbkudtfnrfy5euwug2gbekqm6ug42j76knmtzcrkid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://yj2xh4wxcjncsgj7642jzky7uf4mrjcp6zrcdgxylxbepyvgv4meljqd.onion/ |
Screen |
|
⬇️ |
Never |
http://l2abuimje7jrypvv57p2ihf36rza2etoobyvsddgxqrsssn7tyb7txid.onion/ |
|
Index of / |
⬆️ |
2025-08-20 |
http://43xvcojnfpqlbjxrbuuulyh3xtqrkl3qboi67xxd4jsigmpccbhxcoid.onion/ |
Screen |
|
⬇️ |
Never |
http://6ibv6c5n6orfgzpt4apgqtrbr3ot2ninpbpi6hwolq2lzcgj6lzj4rid.onion/ |
|
Index of / |
⬆️ |
2025-08-20 |
http://kinkwgtp4sfj3tovixjlvsklktjul7v5o55lkf6cgmlnugqlletzsxad.onion/ |
Screen |
|
⬇️ |
Never |
http://k2xhcuvhwh5cyua5vwa4xjeyvyfatzkrh5yn5kc5munvglzge4cod2ad.onion/ |
|
Index of / |
⬆️ |
2025-08-20 |
http://zv7u2tclxajbgae6ba4jkisnkfkts3lk7lxlypmuqktrk42qmo2c7hqd.onion/ |
Screen |
|
⬇️ |
Never |
http://secxrosqawaefsio3biv2dmi2c5yunf3t7ilwf54czq3v4bi7w6mbfad.onion/ |
|
Index of / |
⬆️ |
2025-08-20 |
http://cqwdv5rxut5l3blbeg74ddfo6ya65xsxqan7vawffdng6ynd2kulfkqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://nlqnxzqixcwazwyib4bft2m6ikjrtihh4qgdtnmpmbi3meio5jj2xsad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://naurcsrhvsnxotv5awcsmddlcwgv447fvolmkyo6gfgszvtofijd6oid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://rthvusw7vbnulb27tsiacrlewiykoda4wvefeshtsj4bx53o4j6mfrid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://cwywajs3ounh4rioelodfprm72544iokpmttlbitzxmjgqoummdpmqid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://3wahjydjf6min3z67a3254l3uoftkccvn3or3itdppjiz4oogceuy6ad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://dbxgloxt65pvn37ec2of3np4rzo2ksgntxtxbpc4q3sxiur2aiohwqyd.onion/ |
Screen |
Ransomhouse © |
⬆️ |
2025-08-20 |
http://am26uhnrvhikyekz7h5qgjhv6x4arnzpcr2tw4wxqdg7hw525xs4o2qd.onion |
Screen |
Index of / |
⬇️ |
2025-05-02 |
http://tl7m4jpgd5zrrv5lvkl33viucmgztwu6vvr3wqqb7pvlp7i2mavq2jyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://qq4kljefxqsslnl45bxho57meuwpxgn2vdgonlzhmlebnywhst5fupyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ajs5cguwcrm7hocjyswds6hm6hamfrp2zoqfywq7or2j6yvycfo2mpid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://ns7ed6yloo7w5p2lh3mg5bcmkv3aip6wwn7kagb7pxouetm4ymfvsiad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://vwgq5uld5govh3va4ybcda47cye2wd2jnaqy5si56qm3t47dtafy2zqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://vvocdlrov5pc5ej5iuba35vfjehegbdcgnthkt5xr7acekjb4l7y74id.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://nklp3mw3ne5h5ndzo6l2riesmseg2wcbj2tgethqmrsknly4q23ziuqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://iadt27m7yxkouefkcgdettyepemal4jins3htxkhpvhl7w2dgapprnid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://yqotxqmc4gjofhiyp7wvhwqcbc3cszrsvjt4n3uqq3i3pilxhmdxtzqd.onion/ |
Screen |
Description
Our team members are from different countries and we are not interested in anything else, we are only interested in dollars.
We do not allow CIS, Cuba, North Korea and China to be targeted.
Re-attacks are not allowed for target companies that have already made payments.
We do not allow non-profit hospitals and some non-profit organizations be targeted.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
RansomHub | Home |
⬇️ |
2025-04-02 |
http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion/ |
Screen |
Index of / |
⬇️ |
2024-05-09 |
http://mjmru3yz65o5szsp4rmkmh4adlezcpy5tqjjc4y5z6lozk3nnz2da2ad.onion/ |
Screen |
|
⬇️ |
Never |
http://an2ce4pqpf2ipvba2djurxi5pnxxhu3uo7ackul6eafcundqtly7bhid.onion |
|
Index of / |
⬇️ |
2024-08-03 |
http://fpwwt67hm3mkt6hdavkfyqi42oo3vkaggvjj4kxdr2ivsbzyka5yr2qd.onion |
Screen |
|
⬇️ |
2025-03-25 |
http://xeuvs5poflczn5i5kbynb5rupmidb5zjuza6gaq22uqsdp3jvkjkciqd.onion/ |
Screen |
|
⬇️ |
Never |
https://7vy5mydtkf4hqo3g5s4v7skmyn2xdh4mxg3xgtcqnequuospqtsmutqd.onion/ |
|
|
⬇️ |
Never |
http://crylcxzmkllsvq3qgh6gmeg3abqcyliepqza2r57o43gsfwomibq2cyd.onion/ |
|
|
⬇️ |
Never |
http://qa5qvqhtuzlyzrrgc7dkepyj34hb4psf6hk7jmiyn6cef7fxajdleoid.onion/ |
|
RansomHub | File Upload |
⬇️ |
2025-04-01 |
http://ransombgegc4e2vuq45noxekkmauikzt7qu6ab2rqsthdyxdpdufbqid.onion/ |
Screen |
|
⬇️ |
Never |
http://ransomgxjnwmu5ceqwo2jrjssxpoicolmgismfpnslaixg3pgpe5qcad.onion/ |
|
|
⬇️ |
Never |
http://shedjytnmsdgyey7ho7r52leod3plffhe3yjmhyxfxxivnunnmw7coid.onion/ |
|
|
⬇️ |
Never |
http://vqcrizmr7757hjbamfcb7pei2zv462o4ypi2djj4xvy5ax7f2b3c7bad.onion |
|
|
⬇️ |
Never |
http://davtdavm734bl4hkr3sr4dvfzpdzuzei2zrcor4vte4a3xuok2rxcmyd.onion/ |
|
|
⬇️ |
Never |
http://dd4djzr2ywfcox3zfvpkpyh3b657hsdwpwv5cfkmdfde2lr3fpz6spad.onion/ |
|
|
⬇️ |
Never |
http://cki3klxqycazagx3r5prae3nmfvxmwa34beknr3il4uf76vxd76akqid.onion/ |
|
|
⬇️ |
Never |
http://pod4gkypkd6kykwoht3kioehhpoh4k75ybdfoe6q7hqbphrd77b32jqd.onion/ |
|
RansomHub - Login |
⬇️ |
2025-02-11 |
http://445ouvbxlevrxm7phyfr4au3ritat62zl7cwvrarvonrwmququordayd.onion |
Screen |
|
⬇️ |
Never |
http://nr4jw2reeta2u4n2sq4sejjudllir4yfotzf5d4p3wn2ep6ddomtxxid.onion/ |
|
|
⬇️ |
Never |
http://m52fl4estv4lmcvqhssh7mb7nsygiwe7oybhjhny7iuzrzwulq455eqd.onion |
|
|
⬇️ |
Never |
http://brclvwefzszko5xrlan7pebyliqdkv5cw75xksrxp772urjytkko5fyd.onion |
|
RansomHub - Login |
⬇️ |
2025-01-09 |
http://rmr2kgq6vzifnyoaz7jaxdx5t6gsxurbakah5bafatsqldtt2mwneyid.onion |
Screen |
RansomHub - Login |
⬇️ |
2024-12-27 |
http://xdg53hbpwshgtbfbm6m7nv3ckkduo3dfdwdearcsvybfb3qaf4v7suyd.onion |
Screen |
|
⬇️ |
Never |
http://toq7bk6abkr6lapwj3k22ffu4ud5jpox7jbfgzetpz7lxb427katstid.onion |
|
RansomHub - Login |
⬇️ |
2025-03-05 |
http://tjnt7x2xodhthwrfnabhloogoo66jrgohgzpta22uwbqznsvrm5tu4id.onion/ |
Screen |
RansomHub - Login |
⬇️ |
2025-03-02 |
http://fvixrjsdk2adazfnz4mrdvr4eznm346fk33y7nos65bdrtmfvw7f5vid.onion/ |
Screen |
RansomHub - Login |
⬇️ |
2025-03-17 |
http://vhxbjx4iaeqgna22kqt5ajlqi72vbm6qcjev3efgr5oiklgptvjvjhqd.onion/ |
Screen |
RansomHub - Login |
⬇️ |
2025-03-05 |
http://yszafmehxkoa7hrcay7cnyogfrmjqc4grds6innadspii5oz6fneyzyd.onion/ |
Screen |
RansomHub - Login |
⬇️ |
2025-03-08 |
http://i4xita2momkw2jitqohbqgomjxqp53pyvgv5gbogvendbx3ucnynekyd.onion/ |
Screen |
|
⬇️ |
Never |
http://3ysbtsnhldlijvfdv7hwkr2gl3op2d56puspeo4whs6p272sde6fq5id.onion/ |
|
404 Not Found |
⬆️ |
2025-08-20 |
http://bd3atkmicmcif6mliquqdxltjq6mxvagw44gealayp34awtcx3ywlxid.onion/ |
Screen |
404 Not Found |
⬆️ |
2025-08-20 |
http://biurt7anlhkncf2t3dvvtlszpnnyg3oiksyapcikxostz6zfrh4csvid.onion/ |
Screen |
404 Not Found |
⬆️ |
2025-08-20 |
http://bzfp6qfir7bfqjxnpgofwvfzoyca7kmcsfliot5zzfsas6oofwo7zoad.onion/ |
Screen |
|
⬇️ |
Never |
http://fmcrlb2t524cpiiqiudbvdjmgvaczix2o5y5uc3zvi57niiyl467qgyd.onion/ |
|
|
⬇️ |
Never |
http://gsqxzyynjegp73imth5p3ug4etgbehd3pb72e4zmiro4st3s2nlkmgyd.onion/ |
|
|
⬇️ |
Never |
http://hjs27fuzq4j4gzshhbakt274eewxv2qdwmeugjx5eepwoaecczdkiiyd.onion/ |
|
Index of / |
⬆️ |
2025-08-20 |
http://i2agsvbyoy3viwel7ucjqtzcq3ocsj3jqqew5wlwpxty6uxd455qkoqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://kfvsqtlnfa5iiweywpubtqk4c2omc2vu4hvy26mhanaahtvpifzuxlid.onion/ |
Screen |
|
⬇️ |
Never |
http://l5hzzorh57w4wp5va4ouye77x5f2apqd6rvvh3tb2a7vcenn6c5a2fad.onion/ |
|
Index of / |
⬆️ |
2025-08-20 |
http://ljxmkfr6kl3ovwgkxycdrvvdf6tk7qdhgowcjkpsiocg7j5uuhmszyyd.onion/ |
Screen |
404 Not Found |
⬇️ |
2025-08-20 |
http://red46f427ed4ogc76gscsqrytpdh4gy5reh2g6dzjpbm24k3ns2t27qd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://xznhtihjpaz3rwcgwqrv3jipbbivlg5ttsdqoet55xe5a3nbxi47jwqd.onion/ |
Screen |
404 Not Found |
⬆️ |
2025-08-20 |
http://y2hkrrb7aba2pgyvpfzqj3vlhbw7e2wj2t2wvtlmkr54yqz7p5ghnfid.onion/ |
Screen |
RansomHub - Login |
⬇️ |
2025-03-08 |
http://yvst24dvz66unqqes6se3p3flxyzbtohaz6faknu5ne3zzeq2jumpiid.onion |
Screen |
RansomHub - Login |
⬇️ |
2025-03-08 |
http://sres5y2sze7lqkk5s4ahns5lhvc7nr5hqy5lchbxcvhaty2hnivdacqd.onion |
Screen |
RansomHub | R.I.P. |
⬇️ |
2025-08-20 |
http://ijbw7iiyodqzpg6ooewbgn6mv2pinoer3k5pzdecoejsw5nyoe73zvad.onion/blog |
Screen |
RansomHub | R.I.P. |
⬆️ |
2025-08-20 |
http://rnc6scfbqslz5aqxfg5hrjel5qomxsclltc6jvhahi6qwt7op5qc7iad.onion |
Screen |
Description
Also known as MedusaLocker
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Ransomware blog – We will not give ourselves a name. Just watch out for the leakage of your data:) |
⬆️ |
2025-08-20 |
http://z6wkgghtoawog5noty5nxulmmt2zs7c3yvwr22v4czbffdoly2kl4uad.onion |
Screen |
Submit a Ticket |
⬆️ |
2025-08-20 |
http://qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://37rckgo66iydpvgpwve7b2el5q2zhjw4tv4lmyewufnpx4lhkekxkoqd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2024-06-07 |
http://f6amq3izzsgtna4vw24rpyhy3ofwazlgex2zqdssavevvkklmtudxjad.onion/ |
Screen |
404 Not Found |
⬇️ |
2024-06-07 |
http://f6amq3izzsgtna4vw24rpyhy3ofwazlgex2zqdssavevvkklmtudxjad.onion/market.html |
Screen |
404 Not Found |
⬇️ |
2024-06-07 |
https://ransomed.vc/market.html |
Screen |
|
⬇️ |
2024-06-07 |
https://ransomed.vc/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Red Ransomware Group - Wall of shame |
⬇️ |
2024-08-17 |
http://33zo6hifw4usofzdnz74fm2zmhd3zsknog5jboqdgblcbwrmpcqzzbid.onion/ |
Screen |
None |
⬇️ |
Never |
http://ybxtfftwy2iwfqjy7fvvcrt5sd55fx3sk2yuztbx3y2dxb4dvqdhsiid.onion |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Board of shame |
⬇️ |
2022-12-08 |
http://blog2hkbm6gogpv2b3uytzi3bj5d5zmc4asbybumjkhuqhas355janyd.onion/ |
Screen |
None |
⬇️ |
Never |
http://qrcxhs4x2n4a65rk3zbwm5hu6475bi4w2mdjhfmusovnjc6hc6qcv3ad.onion |
|
None |
⬇️ |
Never |
http://ocsmkribkmoij3uhvhxlpxlpebqhzo5uingee7mvebnv57jqya745uyd.onion |
|
None |
⬇️ |
Never |
http://ybxtfftwy2iwfqjy7fvvcrt5sd55fx3sk2yuztbx3y2dxb4dvqdhsiid.onion |
|
None |
⬇️ |
Never |
http://gwvueqclwkz3h7u75cks2wmrwymg3qemfyoyqs7vexkx7lhlteagmsyd.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Project Relic. Dumps, leaks, news, announcements |
⬇️ |
2023-06-03 |
http://relic5zqwemjnu4veilml6prgyedj6phs7de3udhicuq53z37klxm6qd.onion |
Screen |
None |
⬇️ |
Never |
http://chatc46k7dqtvvrgfqjs6vxrwnmudko2ptiqvlb7doqxxqtjc22tsiad.onion/?auth_id= |
|
Description
REvil Beta
MD5: bed6fc04aeb785815744706239a1f243
SHA1: 3d0649b5f76dbbff9f86b926afbd18ae028946bf
SHA256: 3641b09bf6eae22579d4fd5aae420476a134f5948966944189a70afd8032cb45
* Privilege escalation via CVE-2018-8453 (64-bit only)
* Rerun with RunAs to elevate privileges
* Implements a requirement that if "exp" is set, privilege escalation must be successful for full execution to occur
* Implements target whitelisting using GetKetboardLayoutList
* Contains debug console logging functionality
* Defines the REvil registry root key as SOFTWARE\!test
* Includes two variable placeholders in the ransom note: UID & KEY
* Terminates processes specified in the "prc" configuration key prior to encryption
* Deletes shadow copies and disables recovery
* Wipes contents of folders specified in the "wfld" configuration key prior to encryption
* Encrypts all non-whitelisted files on fixed drives
* Encrypts all non-whitelisted files on network mapped drives if it is running with System-level privileges or can impersonate the security context of explorer.exe
* Partially implements a background image setting to display a basic "Image text" message
* Sends encrypted system data to a C2 domain via an HTTPS POST request (URI path building is not implemented.)
------------------------------------
REvil 1.00
MD5: 65aa793c000762174b2f86077bdafaea
SHA1: 95a21e764ad0c98ea3d034d293aee5511e7c8457
SHA256: f0c60f62ef9ffc044d0b4aeb8cc26b971236f24a2611cb1be09ff4845c3841bc
* Adds 32-bit implementation of CVE-2018-8453 exploit
* Removes console debug logging
* Changes the REvil registry root key to SOFTWARE\recfg
* Removes the System/Impersonation success requirement for encrypting network mapped drives
* Adds a "wipe" key to the configuration for optional folder wiping
* Fully implements the background image setting and leverages values defined in the "img" configuration key
* Adds an EXT variable placeholder to the ransom note to support UID, KEY, and EXT
* Implements URI path building so encrypted system data is sent to a C2 pseudo-random URL
* Fixes the function that returns the victim's username so the correct value is placed in the stats JSON data
------------------------------------
REvil 1.01
MD5: 2abff29b4d87f30f011874b6e98959e9
SHA1: 9d1b61b1cba411ee6d4664ba2561fa59cdb0732c
SHA256: a88e2857a2f3922b44247316642f08ba8665185297e3cd958bbd22a83f380feb
* Removes the exp/privilege escalation requirement for full execution and encrypts data regardless of privilege level
* Makes encryption of network mapped drives optional by adding the "-nolan" argument
------------------------------------
REvil 1.02
MD5: 4af953b20f3a1f165e7cf31d6156c035
SHA1: b859de5ffcb90e4ca8e304d81a4f81e8785bb299
SHA256: 89d80016ff4c6600e8dd8cfad1fa6912af4d21c5457b4e9866d1796939b48dc4
* Enhances whitelisting validation by adding inspection of GetUserDefaultUILanguage and GetSystemDefaultUILanguage
* Partially implements "lock file" logic by generating a lock filename based on the first four bytes of the Base64-decoded pk key, appending a .lock file extension, and adding the filename to the list of whitelisted files in the REvil configuration (It does not appear that this value is referenced after it is created and stored in memory. There is no evidence that a lock file is dropped to disk.)
* Enhances folder whitelisting logic that take special considerations if the folder is associated with "program files" directories
* Hard-codes whitelisting of all direct content within the Program Files or Program Files x86 directories
* Hard-codes whitelisting of "sql" subfolders within program files
* Encrypts program files sub-folders that does not contain "sql" in the path
* Compares other folders to the list of whitelisted folders specified in the REvil configuration to determine if they are whitelisted
* Encodes stored strings used for URI building within the binary and decodes them in memory right before use
* Introduces a REvil registry root key "sub_key" registry value containing the attacker's public key
------------------------------------
REvil 1.03
MD5: 3cae02306a95564b1fff4ea45a7dfc00
SHA1: 0ce2cae5287a64138d273007b34933362901783d
SHA256: 78fa32f179224c46ae81252c841e75ee4e80b57e6b026d0a05bb07d34ec37bbf
* Removes lock file logic that was partially implemented in 1.02
* Leverages WMI to continuously monitor for and kill newly launched processes whose names are listed in the prc configuration key (Previous versions performed this action once.)
* Encodes stored shellcode
* Adds the -path argument:
* Does not wipe folders (even if wipe == true)
* Does not set desktop background
* Does not contact the C2 server (even if net == true)
* Encrypts files in the specified folder and drops the ransom note
* Changes the REvil registry root key to SOFTWARE\QtProject\OrganizationDefaults
* Changes registry key values from --> to:
* sub_key --> pvg
* pk_key --> sxsP
* sk_key --> BDDC8
* 0_key --> f7gVD7
* rnd_ext --> Xu7Nnkd
* stat --> sMMnxpgk
------------------------------------
REvil 1.04
MD5: 6e3efb83299d800edf1624ecbc0665e7
SHA1: 0bd22f204c5373f1a22d9a02c59f69f354a2cc0d
SHA256: 2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6
* Leverages PowerShell and WMI to delete shadow copies if the victim's operating system is newer than Windows XP (For Windows XP or older, it uses the original command that was executed in all previous REvil versions.)
* Removes the folder wipe capability
* Changes the REvil registry root key to SOFTWARE\GitForWindows
* Changes registry key values from --> to:
* pvg --> QPM
* sxsP --> cMtS
* BDDC8 --> WGg7j
* f7gVD7 --> zbhs8h
* Xu7Nnkd --> H85TP10
* sMMnxpgk --> GCZg2PXD
------------------------------------
REvil v1.05
MD5: cfefcc2edc5c54c74b76e7d1d29e69b2
SHA1: 7423c57db390def08154b77e2b5e043d92d320c7
SHA256: e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea
* Add new 'arn' configuration key that contains a boolean true/false value that controls whether or not to implement persistence.
* Implements persistence functionality via registry Run key. Data for value is set to the full path and filename of the currently running executable. The executable is never moved into any 'working directory' such as %AppData% or %TEMP% as part of the persistence setup. The Reg Value used is the hardcoded value of 'lNOWZyAWVv' :
* SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lNOWZyAWVv
* Before exiting, REvil sets up its malicious executable to be deleted upon reboot by issuing a call to MoveFileExW and setting the destination to NULL and the flags to 4 (MOVEFILE_DELAY_UNTIL_REBOOT). This breaks persistence however as the target executable specified in the Run key will no longer exist once this is done.
* Changes registry key values from --> to:
* QPM --> tgE
* cMtS --> 8K09
* WGg7j --> xMtNc
* zbhs8h --> CTgE4a
* H85TP10 --> oE5bZg0
* GCZg2PXD --> DC408Qp4
------------------------------------
REvil v1.06
MD5: 65ff37973426c09b9ff95f354e62959e
SHA1: b53bc09cfbd292af7b3609734a99d101bd24d77e
SHA256: 0e37d9d0a7441a98119eb1361a0605042c4db0e8369b54ba26e6ba08d9b62f1e
* Updated string decoding function to break existing yara rules. Likely the result of the blog posted by us.
* Modified handling of network file encryption. Now explicitly passes every possible "Scope" constant to the WNetOpenEnum function when looking for files to encrypt. It also changed the 'Resource Type" from RESOURCETYPE_DISK to RESOURCETYPE_ANY which will now include things like mapped printers.
* Persistence registry value changed from 'lNOWZyAWVv' to 'sNpEShi30R'
* Changes registry key values from --> to:
* tgE --> 73g
* 8K09 --> vTGj
* xMtNc --> Q7PZe
* CTgE4a --> BuCrIp
* oE5bZg0 --> lcZd7OY
* DC408Qp4 --> sLF86MWC
------------------------------------
REvil v1.07
MD5: ea4cae3d6d8150215a4d90593a4c30f2
SHA1: 8dcbcbefaedf5675b170af3fd44db93ad864894e
SHA256: 6a2bd52a5d68a7250d1de481dcce91a32f54824c1c540f0a040d05f757220cd3
TBD
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
404 Not Found |
⬇️ |
2022-08-19 |
http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ |
Screen |
404 Not Found |
⬇️ |
2022-08-19 |
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/ |
Screen |
Blog |
⬇️ |
2023-01-06 |
http://blogxxu75w63ujqarv476otld7cyjkq4yoswzt4ijadkjwvg3vrvd5yd.onion/Blog |
Screen |
|
⬇️ |
Never |
http://2wub3njb7zvmnn6xohbuizjcbvy4w5dvlb4puesry3rrl6gx4452ezid.onion |
|
|
⬇️ |
Never |
http://54xj22qsftuzs6bhcistgz27reblgijdjggkgb3fdhfgl3ghkmzk7dad.onion |
|
|
⬇️ |
Never |
http://65x5syrn4gmgfnicrhyfwkokw5x3xipxer2z4vhhckrh756v6m5272qd.onion |
|
|
⬇️ |
Never |
http://fsgwyl2xd2h5s43er7epr6vuqu5eddmmtgp6cq7khmkoe3ba4d37w7ad.onion |
|
|
⬇️ |
Never |
http://rrjwr4jsju3nuwjz77hbcquiuq5hc3oc7yxlgi5rxeazehf7mlkzcvid.onion |
|
|
⬇️ |
Never |
http://ttn4gqpgvyy6tuezexxhwiukmm2t6zzawj6p3w3jprve36f43zxr24qd.onion |
|
None |
⬇️ |
Never |
http://landxxeaf2hoyl2jvcwuazypt6imcsbmhb7kx3x33yhparvtmkatpaad.onion/ |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Rhysida |
⬆️ |
2025-08-20 |
http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/archive.php |
Screen |
|
⬆️ |
2025-08-20 |
http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/archive.php?auction |
Screen |
Rhysida |
⬆️ |
2025-08-20 |
http://rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion/ |
Screen |
Onionsite Not Found |
⬆️ |
2025-08-20 |
http://rhysidaeoxtkejwuheks3a7htk4zn3dfuynt5mqw6oawlcx6kcxjdeyd.onion |
Screen |
Onionsite Not Found |
⬇️ |
2025-08-19 |
http://rhysidaiqemmlrvn2jvncdwhkvuiv7s2iu342xnrpeynxoe6r2dtjfyd.onion |
Screen |
Onionsite Not Found |
⬆️ |
2025-08-20 |
http://rhysidaqho36b6i6mvpmy5di4ro5zglovtxixrirky6q3fgack7q5uyd.onion |
Screen |
Description
Risen, which is a fully optimized and high-speed program, is the result of our years of experience in the field of malware writing. Risen is written in C language and completely using winapi. We produced many products with different features and options, but we came to the conclusion that none of the options have the benefit and efficiency they should; So, instead of spending time on useless and inefficient options, we decided to spend all our time on the strength, speed and security of our cryptography, and that's how we created Risen. Software features in version 1:
-Encryption security, utilizing Chacha20 and RSA 2048 algorithms.
-High encryption speed and software optimization
-compatible with all versions of Windows on any hardware without any issues.
-Automatic option settings, its easy to using and default configuration set to the best mode.
-Utilization of Threadpool method and queue creation for encryption.
-A powerful file unlocker, unlock files without closing processes.
-Safe deletion of backups, shadow copies, and all windows logs.
-A blog, Leak website, and management panel on TOR for leaking data of non-paying companies.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://s2wk77h653qn54csf4gp52orhem4y72dgxsquxulf255pcymazeepbyd.onion/ |
|
None |
⬇️ |
Never |
http://o6pi3u67zyag73ligtsupin5rjkxpfrbofwoxnhimpgpfttxqu7lsuyd.onion |
|
None |
⬇️ |
Never |
https://cqqzfmdd2fwshfyic6srf3fxjjigiipqdygosk6sdifstrbtxnm5bead.onion |
|
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Rocket.Chat |
⬇️ |
2025-06-15 |
http://fonektibq4fbgergrorw43yawhz3qslkonrwc74j2h2kftcidmf6g6id.onion/ |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Trending topics on Tumblr |
⬆️ |
2025-08-20 |
https://robinhoodleaks.tumblr.com |
Screen |
Description
Ransomware.
Links
Page title |
Available |
Last visit |
URL |
Screen |
We Are Rook!!! |
⬇️ |
2022-01-25 |
http://gamol6n6p2p4c3ad7gxmx3ur7wwdwlywebo2azv3vv5qlmjmole2zbyd.onion |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Royal |
⬇️ |
2023-10-16 |
http://royal2xthig3ou5hd7zsliqagy6yygk2cdelaxtni2fyad6dpmpxedid.onion |
Screen |
Royal |
⬇️ |
2023-10-16 |
http://royal4ezp7xrbakkus3oofjw6gszrohpodmdnfbe5e4w3og5sm7vb3qd.onion |
Screen |
None |
⬇️ |
Never |
http://72u5vd67xdff354hhge6wjuvsixxwo3c6bvrdlqstgmjfptpbzwrsmad.onion |
|
None |
⬇️ |
Never |
http://k6s24pz55gtvtzzpg4riv7zb74vts425bl42zrpmice5ud3a65itj6ad.onion/ |
|
None |
⬇️ |
Never |
http://yef4xoqj2jq554rqetf2ikmpdtewdlbnx5xrtjtjqaotvfw77ipb6pad.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
code-server login |
⬇️ |
2023-07-12 |
http://t2tqvp4pctcr7vxhgz5yd5x4ino5tw7jzs3whbntxirhp32djhi7q3id.onion |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Вход | Read The Manual |
⬆️ |
2025-08-20 |
http://nv4addu4insb7x6aagdv6r5gvxzczgfje7mmecsjonnrvsq7ulevvfid.onion |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http://3wugtklp46ufx7dnr6j5cd6ate7wnvnivsyvwuni7hqcqt7hm5r72nid.onion/ |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Run Some Wares |
⬆️ |
2025-08-20 |
http://rnsmwareartse3m4hjsumjf222pnka6gad26cqxqmbjvevhbnym5p6ad.onion/ |
Screen |
404 Not Found |
⬇️ |
2025-04-19 |
http://nidzkoszg57upoq7wcalm2xxeh4i6uumh36axsnqnj3i7lep5uhkehyd.onion/ |
Screen |
404 Not Found |
⬇️ |
2025-04-19 |
http://oow7rehrxlzpy6vh3hezl2khstkpa6s7wx3iit74tr6xbjibupld5iad.onion/ |
Screen |
Index of / |
⬇️ |
2025-06-07 |
http://cvbu44wmzzslykypqkk3utdvrrdenrf5knvyrshhcvosfxa2un4tqrid.onion/ |
Screen |
403 Forbidden |
⬆️ |
2025-08-20 |
http://vnoa7t4c3wr6himmurl4it3ctvgmm6munjknuztqlu4nbz34367vokyd.onion |
Screen |
None |
⬇️ |
Never |
https://lmsxwm6hrd5osuefl6uia3wwnxxnlav2ce4d4nkjvuonb3426pwdmcad.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
BLOG |
⬇️ |
2021-11-13 |
http://54bb47h5qu4k7l4d7v5ix3i6ak6elysn3net4by4ihmvrhu7cvbskoqd.onion/blog |
|
Welcome page |
⬆️ |
2025-08-20 |
http://54bb47h.blog |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://nj5qix45sxnl4h4og6hcgwengg2oqloj3c2rhc6dpwiofx3jbivcs6qd.onion |
|
SAFEPAY |
⬇️ |
2025-06-17 |
http://nz4z6ruzcekriti5cjjiiylzvrmysyqwibxztk6voem4trtx7gstpjid.onion |
Screen |
|
⬇️ |
2025-06-21 |
http://qkzxzeabulbbaevqkoy2ew4nukakbi4etnnkcyo3avhwu7ih7cql4gyd.onion/ |
Screen |
|
⬇️ |
2025-06-21 |
http://iieavvi4wtiuijas3zw4w54a5n2srnccm2fcb3jcrvbb7ap5tfphw6ad.onion/ |
Screen |
Welcome to nginx! |
⬇️ |
2025-03-04 |
http://fcde4o7iquaspdbo5yetwqn3rfueet2zfy3wjosrc5dznyccwbiz6oyd.onion/ |
Screen |
403 Forbidden |
⬇️ |
2025-08-18 |
http://crmbcdcdwoex6dzajbicgzrsuw2t76pomajwdpi2mb2babbfdgcc6xid.onion/ |
Screen |
SAFEPAY |
⬆️ |
2025-08-20 |
http://j3dp6okmaklajrsk6zljl5sfa2vpui7j2w6cwmhmmqhab6frdfbphhid.onion/ |
Screen |
Access denied |
⬆️ |
2025-08-20 |
http://wmgres25e43uwgebctgofo2qe23kf5vqevixiulubpovdglyizfugryd.onion/ |
Screen |
|
⬇️ |
Never |
http://dgcg5ncjab6scb7fnk7gx5php4lbpxjy2jjnu3apnkxyippqf6yhw3ad.onion |
|
|
⬇️ |
Never |
http://oxly5vxvvhi5fv5vsvj3kvlqeprbijitycqisylaxzf324bn7e4qr2ad.onion |
|
|
⬇️ |
Never |
tonsite://safepay.ton |
|
Safepay Blog |
⬆️ |
2025-08-20 |
http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Sarcoma Group |
⬆️ |
2025-08-20 |
http://sarcomawmawlhov7o5mdhz4eszxxlkyaoiyiy2b5iwxnds2dmb4jakad.onion |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://bi32pq7y3gqq3qacgvamnk2s2elnppvevqp325wtk2wo7vh2zavjcfid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://54yjkjwjqbm74nchm6o6b4l775ws2hgesdopus5jvo3jx6ftj7zn7mid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://ngvvafvhfgwknj63ivqjqdxc7b5fyedo67zshblipo5a2zuair5t4nid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://icmghe66zl4twvbv5g4h532mogcea44hrkxtotrlx6aia5jslnnbnxad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://lyz3i74psw6vkuxdjhkyxzy3226775qpzs6oage4zw6qj66ppdxma2qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://55lfxollcks2pvxbtg73vrpl3i7x4jnnrxfl6al6viamwngqlu4cxgyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://modre6n4hqm4seip2thhbjcfkcdcljhec7ekvd5qt7m7fhimpc2446qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://r3yes535gjsi2puoz2bvssl3ewygcfgwoji6wdk3grj3baexn2hha2id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://pauppf2nuoqxwwqqshaehbkj54debl7bppacfm5h6z6zjoiejifezhad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://iiobxrljnmjwb6l66bfvhin5zxbghbgiv6yamqpb4bezlrxd2vhetgyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-03-22 |
http://nf5b6a4b4s623wfxkveibjmwwpqjm536t5tyrbtrw7vsdqepsdoejoad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://rs3icoalw6bdgedspnmt6vp2dzzuyqxtccezmta2g5mlyao64len7dyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-02-14 |
http://lpp4aze237qkkursbtesd54ofag6te5i5lzpee5a3buhq4v3uwtxnlqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://6nwhpuwtf4onxvr7el5ycc4xwefhk4w6q6rbn23oe2ghax2x7nns3iad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://7usqkx3whuqipzsolnctey7xgszixv446vam7et2qas6xmuxtjm54pad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://jck4dycheanyy6zrolymheurxak54o53lzg3hfcz7ao35hs7fewsaoyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://wi5q5npnch6fy5y7m4jtjznrydzyhtp6ik4j5swrdsehdwtvv3akleqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://tlntayu7wbtcqxtumbqh4x2vzurw7ybpuhtozusbxuqggcwmnisd7vid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://ycgedgigkqoeabmpnpwwbqojcgldekrjraaeeo4litevj5bvp7dtmrid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://tr2w7zxx2clrckh4mr6aupyennkngrz2bfuohpdzeifajgeqg6rtxxyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://tg6cr3uyeakbug6jt4oeaxbcpu4urdpm7ksk6uk7sdwg3walnqcwftqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://4b2njxftjecmzgyafn46dcyibnv3mourddcfq7qxdylkov4bisjl7xqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://fijqvpzptg2sxavr3s6vw32lx4xdfa3i2oedi4574qo3apqyhd7srwad.onion/ |
Screen |
Index of / |
⬇️ |
2025-01-14 |
http://twm7i3mxyydc2ew5ppbmjiz6rzww7ze32t2ecmznnsywdccwatzjxead.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://qysbb5qdwpxsimtrsbehqc75q4b2lw6m4imtnswgmbsq2mw4ulvxevqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://fbrmzvj2c6a5soanvuw3qi4dpnt3rcgte32nae4qegd4vqpnjtrwbqid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://6v3lslpnsfae4rfghnl473u4hp7j6yyu74pipyks54norp4filkzjgid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://l2atrqqwpmgdr4vzae7ufgulirsklfk4xmierg4ihdxborjkpyuz5lyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://yry66r4til42vxubkqpy5wo75mshv7pcaqtbg4rzl55bs55yzav73uyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://7h422j3rpt7dxoeijbzn6xo7t43dmaisl5t44mcsf6ulbj3weg6doqyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://4x2dnydjwfpa4zgutwqaeqxd7tmdz452ttvvq5pga5eqgppi2uu5chyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://ufwlfce4qkiqsda7e2mhaibgyyi6jfjhu55j7uoq6bh3kmue7pc34iid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://tfeijfoxmvqcoqjz2nvgfblxge27fyiy2k2fshiiccyrdz4kfiwaziid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://cth3pse7mszuess3jeiftdawcqcm7cvwrrx7hiwi7zxzh55jvh6f42id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://zyzmgujsdh4xjmxjf4j6riqn4s52jfpiurcpabk5uxfitmz4pusaueqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://lq72f4y2gbujxypmicycfpmmtv74tazt4h6szumrniuvgxwkwi4ykcyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://i44esri5nzpdcanpgflcrlxk4tmf7yfpxkcysha3gblsuiswyyxmi3qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://t3ym2cemf625rd5slz5ifp2jz2ldntmlbn74i5joebg6c74fmnpmuyqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://hh4ueveki3serlpuvt63lp557z5qhlfwlc32bclw4x53dmt3ijoewmqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://5ka4wjkv3qulsn6gtfzyhumafgupipu6rkfezf2tw2doveamaqqmxvyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://ibrdo3v56w6veyp6moi7iaadtk6o4qa6eyppc3svinph4vx5qrllpzid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://rsrcywwt7b53kw2lsioilnfrrs2lixt4nttzpcli74fjvfk4kqbfh5qd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://pcgkekcyyzl465rqt4mpezjkjdkoxgb7c4j6nbb6rn4gnw7zme24lrad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://g7vfmyo2xvt4uwoypgb675rcgxokwdxqevmx5ie5qojqnkuvnuudemqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://zaie6jcetdtqhi5epab45wzginog4kuo4sx4nwr4ydkdby76b5ri3xqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://4eahz4i6cjqychvmiyqjducmhu3pep6l52vaw3ik3nizzpt5writuryd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://herbgxwb46z3pikyy6h6wckbjebg4ytuoijqceu2wsse4nh5tyuqqxqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://63qnrvuxwl3jkzqik33ppgvktytzy5vasmp5yyhkv4mzbv5enuc5pqqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://cqjqlbmmfqanj6ctywkmgzi7iythgc6atu2xgjbkk2ccr465gizolqqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://mtd2ltbdnsudzaneia6i6xgwkpn7adxfuesqstrreyqxlgxbxejpojid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://wsl6ouwdqk62yhddt2rvy6i7jzdegbufklfp6hdpgxn6vmwqlsqy23id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://n4axoeoemdqamjhicytqnebburiwbmvviqyltoqtljoancodgijw32yd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://lqlkfdi2ydpzibk4xpikfvae3bjdd4lsodgwtpunxfc6abkexsg5a2ad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://jq6vxgpnjfs3ue2wn7ve4bnga4ewkcetpvkmz324se7mlqjtnrenkqad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://qhzy4ur5atch5orjkd2h3x34kwqbswqzqnllaij4crl3v2mnrj7aouyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://tzmfdwducfvlh6ie4juo6ovgft3qwxgf5q7dxca57fqalpn6zsed3lad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://jdphsfcjuyog5cgtjdfsxluarkvqy5rw75kasoj6kuihga3bs3fwgfyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://wphvg3uizhfblnuuwyz35nhfpgz254lj3iwd2jrtl2oce6qvmlwpl2id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://bpcxhnyo4rvobiiapjksmzog4lr7gchwfoygqtphzfspbsxdp2lutcad.onion/ |
Screen |
404 Not Found |
⬇️ |
2025-08-19 |
http://6hfobqn3vj2yyjgvgkklftppf3una73dn6am7gpieohkryzg6avr5dqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://igqsxlg2ndj7xmaepxtvkisacskrb3mbhlcgymis42h6l6qyfyjyg7id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://iz62i5obz6mwixyjwxggbw7fk6wdgmmy4ancvynpbqqmgwpnghv3rdid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://riuxxxbufgx5z53gww432mf5jvh2o7mfh22hvmpdw4ksutd6dflj7byd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://zrqe3dtolmluwzbwgktss4habzra3yv67kc35zhoccyj57xf5kuo4ead.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://pgyarykjxofanc7x37qx6am6me4geeebiqh76fslda5jshhup4yljvyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://ykg6a32ed546jveyot236w6cst5xahji4bhnxx4qv6b7wdqrwa3rhmqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://plvvaggo6jjl2wy5dixn2knj4kuypquxfauijigke6qtx3ixjfitglid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://sgwmhbj7y2hehzzkt6fwvj23gjkzsvvhae2f3haavxjbi35tibnhpayd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://67f7qjjoez6fnnrjuqzg4yqjiowvjbe5y2dhmjkiwubtqzj3isc5joid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://tszizx6qdi4uva2jbfg5z2mhdaqh3iduk57obi7hg4m6omta3aymrzad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://uhf6vmrgiqsvytiunb3tustswyhc2nz5aiax3viusb6i2v427pncylqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://j4swv3longylj4ljjdny4yino4xwvrbis5ouxg4anlg4el6kjku7dbqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://dyr566jtgcsyk7si5gn7unygj3pnzgxfwvlureyn3dfi7g7r2ve54zad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://r33gr3wmjrsyo3t5tc6j3yzdtsjhmyzd6xielw6ceu2zr3najset5iad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://amffvuxv5qyi7fwh5cfoehkr4yrp3ushi4qzxm76ahiwro7dequcoxyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://mx5a6zo2vzhnnuazxz5fqwacwd7wnkbxziwty3gedipkbvfn3ngdniid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://p6b2xarot2rng6v6unlb72jtydw7tklqtyrsrhg6jdr5gaass5uk2vad.onion/ |
Screen |
Sarcoma Group |
⬇️ |
2025-05-21 |
http://sarcomabwgzv7ogiulwqfmlul6mjcxy6o3owuld4lqguvevf4kgp3lqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://mjlfzles4bszxnxcjktdu6iujjc7bhui62fc6s5z736jjsaq4zcq4cad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://2pxacmry7fqmbhkuseo2l3rxmyw24ctmengat7hlavlgrcixbepz6aqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://g3adubh3fjsy5ezrmxmy4wxt7dvkhxnkd5deaac47mryvkzvzcf2tvid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://lhc2ghpebf2d5w3qroiphzjnwwbi6oyigt3aztgghy43q7j2vnu3bcad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://hpugjgammwixig4kpti5r67ofjd4qrgkjohbth2irq4nvcv3m7s76tyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://qxbuog46z72pycrwfaedafqy5dodyrt46ucfs4p5vaaigxtudtwerpyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://y2vv2zvegnvv7uwr5saye4enthgq3ghlhomu5a3nshgwih4phn6qusyd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://areaucod7knfvyl2xbnezcucezcwr4iku5psrt74zthoyqegdzqsxzad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://2fcn6dfc4li6kdt7dhqv4rpnmao64txxwcniostcvw6obdw74hiqtkqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://f22licvnajbisahwc73y55se6mgmvxuups2mp7t43jgs4yj7dp6igqad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://rlwqssdty3mmlxla2h4iviv32qtig54nxw7ww3wt2bmxp74a3qmo75ad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://krxmjef2yd7dwmxbgghooskep4kcecxtqqs3iu33evi7dvr5oc3dpkid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://3mwyz2wt6b6zuah5y3eyjmsjkhaowiv6ejqodt2ly4y4rpwcggii65id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://lm7o3nfplejz7jibisw7wwrivlmske4rq6vofvbncl7g7jflvd3ubqid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://zgu66qoreyw4tx7bmtus6gcz7at5ufiqhgyswfnprbwvpcjw4mows7id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://xik5pf7gejiffbapos223f4q7l5pdwv6xwag6irgkltx2lu6wfnglaqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://3fdy7qukqwts2j7w7lks75tueaokjsmotcshzmxjqeojca26s3doocad.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://vysjfhy5gpr2f4p6amiamjo36emgbyh3xelsxg6sudisdfwtfor4rjqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://tbkqp6pbl7uq2ymiii2jqzbre5igk2xtaruzm7fcdtstmufsssekukid.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://nzqvpyyznsn4c3ubidcpywr5iqtnjn3lkcsafnjtsmozowmbjforgeqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://isxttzwtr7havmbj2qmyb7stwmrds32ye42iwc7kxj55adbexdnbfoqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-19 |
http://m7k6jgadomd3nd2mor5sefnuowtwktfjvzihydx6zy2tkohv6aatr3ad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://cgewcqt4x7kb7xgkfu2r3yv5wifzvpx6tojonay3kdgs5tqpjvkd5bqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://lq4acyymyobtq7tafyspo7zlm4bwnmpyyknbtb3zefq2zdy3xxiu5nad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://sbgsnuet6t7kle4tfmgsvgebaqgxab3lrslg6vjeabphzq7jx5232byd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://qccbb75hak6ze6rsm344rx73lh7rk6caha2hvleyopejhtgagxjyioqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://73jrahivyj7cydl3qeiauwm4fkz4f7e4d3deny6qt3cgtwxmkj2vmiyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://enfxn727mx4ue55zgbjkogn3lnb57e5ed7bcooodxsajzsp3dyo5xeyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://4tgkspsiob5zg7vwqmmbquymoj3sacpx4x4qixvgzukjfen4ck4s6mad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://hqzjmm4qg2q2utn2e3yqt5lsnrabjmi5m4o547v4jp3pi2hwp2tkunid.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://nfh5wuh4gvbai237npdu672xmx2di2lo7pcwu6th2a7kzgue2fnhhdad.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://5q3lywcjrujw3vao7cz3ruqd57ugfdcu3qiisklpqillvuidl5wiqlqd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://zp6bziy6wljpkg6i3uxzzcxyajodxzoc7acf5egb2vhzzrot23y3mpyd.onion/ |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://45k4wju2hwdywn3bsgs6mb6izppx6ghq5w3abcp77jz36xnu7sirltid.onion/ |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Server Under Maintenance |
⬆️ |
2025-08-20 |
http://mzg4llxp4kaf4qq5s4hlentf45rjda3mzev3j6hlh2endarc2k6z6oyd.onion/satancd-room |
Screen |
Description
Connected to GD Lockersec and Babuk-Bjorka.
Group is aka SalanLock (from typo on victim pages).
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
satanLock Blog |
⬇️ |
2025-04-25 |
http://212.24.99.211 |
Screen |
satanLock Blog |
⬇️ |
2025-04-25 |
http://5g2e.l.time4vps.cloud/ |
Screen |
|
⬇️ |
Never |
http://mgeegnexyhhn5dpqewihjy33qyhng3gy66h3fogiwefl5hljhtmfznad.onion/ |
|
None |
⬇️ |
Never |
http://2hxbnjzuymvdca4buxlyu4eolz4mbbxw2cnpibbb2od7z77y76di7cad.onion/ |
|
None |
⬇️ |
Never |
http://satanlock2p4c3ad7gxmx3ur7wwdwlywebo2azv3vv5qlmjmole2zbyd.onion |
|
SatanLock V2 Leaks |
⬆️ |
2025-08-20 |
http://tzhwmgguyxrg6q3tu4q3gvopcjynrhw6ryx2bdl5ghisdkyunfua5xyd.onion/ |
Screen |
SatanLock V2 Leaks |
⬇️ |
2025-07-07 |
http://42fybwnnv2t6fykirmgxpwvvfidgnfmegrz4lpi3vskivfid7z7kqyqd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://pnanlicgxkku2aonwsg2fwid3maycsso7joqnzp66wkfemzdk7ahsdid.onion/ |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
SECP0 News |
⬇️ |
2025-08-20 |
http://secponewsxgrlnirowclps2kllzaotaf5w2bsvktdnz4qhjr2jnwvvyd.onion/ |
Screen |
SECP0 News |
⬇️ |
2025-05-15 |
https://secp0-news.net/ |
Screen |
SECP0 News - /files/12b3429e1124122e/ |
⬆️ |
2025-08-20 |
http://secponewsxgrlnirowclps2kllzaotaf5w2bsvktdnz4qhjr2jnwvvyd.onion/files/12b3429e1124122e/ |
Screen |
404 Not Found |
⬆️ |
2025-08-20 |
http://bhn2xz5jer2xeibxjzhgfp7qclttnbvkkvd4hvlmjbnz66jxq7yzn6ad.onion/ |
Screen |
404 Not Found |
⬆️ |
2025-08-20 |
http://2a6w667vebiebciji7vm3vj43svegvozoqypttdgojzgdcbnfsu5wiid.onion/ |
Screen |
None |
⬇️ |
Never |
https://secp0-support.net/ |
|
404 Not Found |
⬆️ |
2025-08-20 |
https://secp0-support.cfd/ |
Screen |
SECP0 News |
⬇️ |
2025-08-20 |
https://secp0-news.ws/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://sekhmetleaks.top/ |
|
None |
⬇️ |
Never |
http://rlmuybcg5h5gaatr.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
SenSayQ |
⬇️ |
2024-08-05 |
http://gmixcebhni6c3kcf5m7xxybomaphj7pizoqtxiqmrz5wsh6g6x5s2wqd.onion/ |
Screen |
None |
⬇️ |
Never |
http://ppzmaodrgtg7r6zcputdlaqfliubmmjpo4u56l3ayckut3nyvw6dyayd.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://cryptorz76e7vuik.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
DuckDuckGo — Privacy, simplified. |
⬇️ |
2023-09-06 |
http://lc65fb3wrvox6xlyn4hklwjcojau55diqxxylqs4qsfng23ftzijnxad.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://sharpboyz.io/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2024-03-25 |
http://nv5p2mmpctvyqdyyi5zwh4gnifq2uxdx4etvnmaheqlrw6ordrjwxryd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://sifrecikx7s62cjv.onion/ |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Silent Blog |
⬆️ |
2025-08-20 |
http://silentbgdghp3zeldwpumnwabglreql7jcffhx5vqkvtf2lshc4n5zid.onion/ |
Screen |
|
⬇️ |
Never |
http://jf2zjpxfh3sob5xr6uc53k7rt4y4vl6rt6bdynd3ptuv4cu5yi43elad.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobi6rlec6f2bgn6rd72xo7hvds4a5ajiu2if4oub2sut7fg3gomqd.onion/leaks |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobi7l3wet3uqn4cagjiessuomv75aw3bvgah4jpj43od7xndb7kad.onion/leaks |
Screen |
Sinobi |
⬇️ |
2025-08-20 |
http://sinobi7sukclb3ygtorysbtrodgdbnrmgbhov45rwzipubbzhiu5jvqd.onion/leaks |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobi23i75c3znmqqxxyuzqvhxnjsar7actgvc4nqeuhgcn5yvz3zqd.onion/leaks |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobia6mw6ht2wcdjphessyzpy7ph2y4dyqbd74bgobgju4ybytmkqd.onion/leaks |
Screen |
Sinobi |
⬇️ |
2025-08-20 |
http://sinobi7yuoppj76qnkwiobwfc2qve2xkv2ckvzyyjblwd7ucpptl62ad.onion/login |
Screen |
Sinobi |
⬇️ |
2025-08-20 |
http://sinobi57mfegeov2naiufkidlkpze263jtbldokimfjqmk2mye6s4yqd.onion/login |
Screen |
|
⬇️ |
Never |
http://sinobibdvzohujkliofkxiz3ueyedfh6bed21zjz2z6pafw5jeoptsid.onion/login |
|
Sinobi |
⬆️ |
2025-08-20 |
http://sinobibjqytwqxjw24zuerqcjyd3hoow6zia7z6kzvwawivamu7nqayd.onion/login |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobicrh73ongfuxjajmlyyhalvkhlcgttxkxaxz3gvsgdcgf76uiqd.onion/login |
Screen |
|
⬇️ |
Never |
http://sinobidxodgt4jsr3t1mf2rr4okjvvwfp5gh31rqxnowomcx62ssrhqd.onion/login |
|
|
⬇️ |
Never |
http://sinobiea4snfqtkc43paumapo40i7vxcy5vjzfoalunsnvzehozfhpyd.onion/login |
|
Sinobi |
⬆️ |
2025-08-20 |
http://blog.sinobi.us.org/leaks |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://chat.sinobi.us.org/ |
Screen |
|
⬆️ |
2025-08-20 |
http://cdn.sinobi.us.org/ |
Screen |
|
⬇️ |
2025-08-20 |
http://sinobihmkmncjubqin5u44vso3z2zongdmmtgle7eglskjmfb6u74rad.onion/ |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobibdvzohujkliofkxiz3ueyedfh6bed2lzjz2z6pafw5jeoptsid.onion |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobidxodgt4jsr3tlmf2rr4okjvvwfp5gh3lrqxnowomcx62ssrhqd.onion |
Screen |
Sinobi |
⬆️ |
2025-08-20 |
http://sinobiea4snfqtkc43paumapo4oi7vxcy5vjzfoalunsnvzehozfhpyd.onion |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
SKIRA TEAM - Hacking News Main Page |
⬇️ |
2025-05-16 |
http://mtgc3qvyedjnfu7cen2zsupdppi5ys5g2hm6xwujvoepw25p4dy6huid.onion/news.html |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://encr9djfOJdew92nfjK9sdn34nfsks.onion |
|
|
⬇️ |
Never |
http://encrKdm13nfKJNdwf7kd.onion |
|
|
⬇️ |
Never |
http://encr5RhdkjNNJdwq62dfHIUJ7Gdmiu4KdJRvd9md.onion |
|
|
⬇️ |
Never |
http://encrEjdHGdmd45JdndqkOPqe8jhNdqk.onion |
|
|
⬇️ |
Never |
http://encrP43djqOIjsq2ndakdkir91dndkqOd34dmaQq71.onion |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
slug |
⬇️ |
2024-03-11 |
http://3ytm3d25hfzvbylkxiwyqmpvzys5of7l4pbosm7ol7czlkplgukjq6yd.onion |
Screen |
Description
Snatch is a ransomware which infects victims by rebooting the PC into Safe Mode. Most of the existing security protections do not run in Safe Mode so that it the malware can act without expected countermeasures and it can encrypt as many files as it finds. It uses common packers such as UPX to hide its payload.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
News |
⬇️ |
2023-11-02 |
http://hl66646wtlp2naoqnhattngigjp5palgqmbwixepcjyq5i534acgqyad.onion |
Screen |
News |
⬇️ |
2022-12-13 |
https://snatch.press/ |
Screen |
|
⬇️ |
2024-09-12 |
https://snatchteam.cc |
Screen |
Just a moment... |
⬇️ |
2024-12-16 |
https://snatchnews.top/ |
Screen |
None |
⬇️ |
Never |
http://snatch6rpvi7yy4t.onion/ |
|
None |
⬇️ |
Never |
http://snatch2q72f2wjff.onion/ |
|
None |
⬇️ |
Never |
http://snatchh5ssxiorrn.onion/ |
|
None |
⬇️ |
Never |
http://snatch6brk4nfczg.onion/ |
|
None |
⬇️ |
Never |
http://snatchwezarcr27t.onion/ |
|
None |
⬇️ |
Never |
http://snatch24uldhpwrm.onion/ |
|
|
⬇️ |
2025-08-20 |
http://mydatassuperhero.com/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Rocket.Chat |
⬇️ |
2025-06-15 |
http://xzbltrroh4ocknyi7kj2ucjuw63fhyy23dh6lplydl545d33kbygw2id.onion/home |
Screen |
Description
Ransomware, written in .NET.
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://solidb2jco63vbhx4sfimnqmwhtdjk4jbbgq7a24cmzzkfse4rduxgid.onion/login |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Space Bears |
⬆️ |
2025-08-20 |
http://5butbkrljkaorg5maepuca25oma7eiwo6a2rlhvkblb4v6mf3ki2ovid.onion/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Blog |
⬇️ |
2022-10-01 |
http://zj2ex44e2b2xi43m2txk4uwi3l55aglsarre7repw7rkfwpj54j46iqd.onion |
Screen |
None |
⬇️ |
Never |
http://z33da2c5d6t4ekkv4pxao7znpc2w2m47llzvg76g6xxgyd5wqqmfrtqd.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Spook |
⬇️ |
2021-10-26 |
http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/blog/ |
|
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Stormous-ransomware |
⬇️ |
2022-05-09 |
http://3slz4povugieoi3tw7sblxoowxhbzxeju427cffsst5fo2tizepwatid.onion |
|
...... |
⬇️ |
2023-10-01 |
http://h3reihqb2y7woqdary2g3bmk3apgtxuyhx4j2ftovbhe3l5svev7bdyd.onion |
Screen |
Stormous _ official Site |
⬇️ |
2023-10-01 |
http://h3reihqb2y7woqdary2g3bmk3apgtxuyhx4j2ftovbhe3l5svev7bdyd.onion/stm.html |
Screen |
StormouS.V4 BLOG |
⬇️ |
2025-08-20 |
http://pdcizqzjitsgfcgqeyhuee5u6uki6zy5slzioinlhx6xjnsw25irdgqd.onion |
Screen |
Index of / |
⬆️ |
2025-08-20 |
http://6sf5xa7eso3e3vk46i5tpcqhnlayczztj7zjktzaztlotyy75zs6j7qd.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://chat5sqrnzqewampznybomgn4hf2m53tybkarxk4sfaktwt7oqpkcvyd.onion/ |
|
None |
⬇️ |
Never |
http://sugarpanel.space/advauth_ffma |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
News |
⬇️ |
2023-05-02 |
http://x2miyuiwpib2imjr5ykyjngdu7v6vprkkhjltrk4qafymtawey4qzwid.onion/ |
Screen |
None |
⬇️ |
2021-05-01 |
http://nbzzb6sa6xuura2z.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
end of game |
⬇️ |
2021-08-18 |
http://xqkz2rmrqkeqf6sjbrb47jfwnqxcd4o2zvaxxzrpbh2piknms37rw2ad.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://ugoakjk3v6hop3epjhdgn4num43ndb5glgixhraeg2xm455gxqtu2qid.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
SignIn | Chat |
⬇️ |
2023-09-30 |
http://undgrddapc4reaunnrdrmnagvdelqfvmgycuvilgwb5uxm25sxawaoqd.onion |
Screen |
SignIn | Chat |
⬇️ |
2025-03-05 |
http://ehehqyhw3iev2vfso4vqs7kcrzltfebe5vbimq62p2ja7pslczs3q6qd.onion/auth/login |
Screen |
All data | Underground store |
⬆️ |
2025-08-20 |
http://47glxkuxyayqrvugfumgsblrdagvrah7gttfscgzn56eyss5wg3uvmqd.onion/ |
Screen |
SignIn | Chat |
⬇️ |
2025-08-20 |
http://2nyysjgsfhnwizvbhjeklagbdbjz2z27meao7asl73zcqpb5cr4n4eyd.onion |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬆️ |
2025-08-20 |
http://tp5cwh6d2b5hekcg6jlhoe6mawa7dlwiv47epvnfmzuaaur2dnaa3uid.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Termite |
⬆️ |
2025-08-20 |
http://termiteuslbumdge2zmfmfcsrvmvsfe4gvyudc5j6cdnisnhtftvokid.onion |
Screen |
Index of / |
⬇️ |
2024-12-17 |
http://pqw3hepvky2pgyyv6dupvx47cm2gxzwop6dfei3i67dj76tdj6alplqd.onion/ |
Screen |
Index of / |
⬇️ |
2025-05-08 |
http://4xklh64cl2lymm6n5xywinfq4wlchgugvv5a77pm3pta34svnohwl2id.onion/ |
Screen |
Index of / |
⬇️ |
2025-08-20 |
http://wc4mc3oupskb2c3q4ba6tlf6tq5mdfoevsgfcotbnbsr4tbqoaomftid.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
DuckDuckGo - Protection. Privacy. Peace of mind. |
⬇️ |
2025-06-06 |
http://g6gwcbiylnvrzj6txsypi72weymzdg6oov2qycu36ggfx3narejcqcid.onion/HNDPXubuzAllW18lBXjT6HU3QnyCtlClvWD8dfcnU6ZUa |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://xir242nunyist4d7ksfnfmhnjx4gvqbuzo7eax4o3abqjesbxjshh4qd.onion/ |
|
Description
Members:
Eco
Ego
emo
elo
user
Dante
Sevy
Links
Page title |
Available |
Last visit |
URL |
Screen |
Suspected phishing site | Cloudflare |
⬆️ |
2025-08-20 |
http://tooda.sh |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Chat |
⬇️ |
2025-02-22 |
http://cwybfdfhstmmoaxmnz4os7qxdcomnp5qleslqb55vt24vh3kmyl6jmad.onion/ |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Blog |
⬇️ |
2023-06-26 |
http://6n5tfadusp4sarzuxntz34q4ohspiaya2mc6aw6uhlusfqfsdomavyyd.onion |
Screen |
Trigona is Gone |
⬇️ |
2023-10-18 |
http://trigonax2zb3fw34rbaap4cqep76zofxs53zakrdgcxzq6xzt24l5lqd.onion |
Screen |
404 Not Found |
⬇️ |
2023-10-18 |
http://trigonax2zb3fw34rbaap4cqep76zofxs53zakrdgcxzq6xzt24l5lqd.onion/api |
Screen |
Blog |
⬇️ |
2024-04-10 |
http://krsbhaxbki6jr4zvwblvkaqzjkircj7cxf46qt3na5o5sj2hpikbupqd.onion |
Screen |
|
⬇️ |
2024-04-10 |
http://krsbhaxbki6jr4zvwblvkaqzjkircj7cxf46qt3na5o5sj2hpikbupqd.onion/api |
Screen |
Blog |
⬇️ |
2024-03-01 |
http://zp6la4xdki3irsenq3t7z7pu2nnaktqgob6aizlzjkdiyw6azjeuhzqd.onion |
Screen |
|
⬇️ |
Never |
http://3x55o3u2b7cjs54eifja5m3ottxntlubhjzt6k6htp5nrocjmsxxh7ad.onion/ |
|
|
⬇️ |
Never |
http://znjkde7j35jed5qqz3sfiv56v6hyfkbluke5ypi2su5vhx2nruswjcad.onion/ |
|
|
⬇️ |
Never |
http://aeey7hxzgl6zowiwhteo5xjbf6sb36tkbn5hptykgmbsjrbiygv4c4id.onion/ |
|
|
⬇️ |
Never |
http://znuzuy4hkjacew5y2q7mo63hufhzzjtsr2bkjetxqjibk4ctfl7jghyd.onion |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Trinity |
⬆️ |
2025-08-20 |
http://txtggyng5euqkyzl2knbejwpm4rlq575jn2egqldu27osbqytrj6ruyd.onion/ |
Screen |
rans |
⬆️ |
2025-08-20 |
http://txtggyng5euqkyzl2knbejwpm4rlq575jn2egqldu27osbqytrj6ruyd.onion/articles |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
404 Not Found |
⬇️ |
2024-04-11 |
http://orfc3joknhrzscdbuxajypgrvlcawtuagbj7f44ugbosuvavg3dc3zid.onion/victim.html# |
Screen |
Index of / |
⬇️ |
2024-04-11 |
http://orfc3joknhrzscdbuxajypgrvlcawtuagbj7f44ugbosuvavg3dc3zid.onion/ |
Screen |
Index of / |
⬇️ |
2024-04-11 |
http://pkk4gbz7lsbgeja6s6iwsan2ce364sqioici65swwt65uhicke65uyid.onion/ |
Screen |
Index of / |
⬇️ |
2024-04-11 |
http://5qmw6mv5ucbeskd3rv6vgn5dqgsuectmtqvz4paukmvhtlazzkuxuwqd.onion/ |
Screen |
404 Not Found |
⬇️ |
2024-04-11 |
http://5qmw6mv5ucbeskd3rv6vgn5dqgsuectmtqvz4paukmvhtlazzkuxuwqd.onion/victim.html |
Screen |
404 Not Found |
⬇️ |
2024-04-11 |
http://pkk4gbz7lsbgeja6s6iwsan2ce364sqioici65swwt65uhicke65uyid.onion/victim.html |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
U-bomb |
⬇️ |
2024-08-06 |
http://contiuevxdgdhn3zl2kubpajtfgqq4ssj2ipv6ujw7fwhggev3rk6hqd.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://tdoe2fiiamwkiadhx2a4dfq56ztlqhzl2vckgwmjtoanfaya4kqvvvyd.onion |
|
None |
⬇️ |
Never |
http://darktorhvabc652txfc575oendhykqcllb7bh7jhhsjduocdlyzdbmqd.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Home | UnSafeBlog |
⬇️ |
2024-04-11 |
http://unsafeipw6wbkzzmj7yqp7bz6j7ivzynggmwxsm6u2wwfmfqrxqrrhyd.onion/ |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Vendetta |
⬇️ |
2024-02-08 |
http://test.cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion |
Screen |
Description
Official twitter account: https://x.com/ValenciaLeaks72
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Valencia Ransomware |
⬇️ |
2024-10-07 |
http://6doyqxqqj36vnedtt2zwxmngx52mgyp7brbrtwkyd75jgiolocoybgid.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
VanHelsing Chat |
⬇️ |
2025-05-13 |
http://vanhelqmjstkvlhrjwzgjzpq422iku6wlggiz5y5r3rmfdeiaj3ljaid.onion/ |
Screen |
VanHelsing Blog |
⬇️ |
2025-05-14 |
http://vanhelvuuo4k3xsiq626zkqvp6kobc2abry5wowxqysibmqs5yjh4uqd.onion/ |
Screen |
VanHelsing Blog |
⬇️ |
2025-05-14 |
http://vanhelxjo52qr2ixcmtjayqqrcodkuh36n7uq7q7xj23ggotyr3y72yd.onion/ |
Screen |
VanHelsing Chat |
⬇️ |
2025-05-13 |
http://vanhelsokskrlaacilyfmtuqqa5haikubsjaokw47f3pt3uoivh6cgad.onion/ |
Screen |
VanHelsing Blog |
⬇️ |
2025-05-14 |
http://vanhelwmbf2bwzw7gmseg36qqm4ekc5uuhqbsew4eihzcahyq7sukzad.onion/ |
Screen |
VanHelsing Chat |
⬇️ |
2025-05-13 |
http://vanhelcbxqt4tqie6fuevfng2bsdtxgc7xslo2yo7nitaacdfrlpxnqd.onion/ |
Screen |
VanHelsing Chat |
⬇️ |
2025-05-13 |
http://vanheltarnbfjhuvggbncniap56dscnzz5yf6yjmxqivqmb5r2gmllad.onion/ |
Screen |
|
⬇️ |
Never |
http://vanhelln5ly3sw63b5ke25gxvp5rr67wd7rgzezo4mhegm4qpsolbkqd.onion/ |
|
|
⬇️ |
Never |
http://vanhel4wqo425m7rdjolykd22js3hkrvpwld6iyvpjslj63l5ocaqoqd.onion/ |
|
|
⬇️ |
Never |
http://vanhelq3jf5afpkwwlcfm32sdblpfkx2cfa4kxaeoabtnxjpu2qnt7id.onion/ |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
THIS HIDDEN SITE HAS BEEN SEIZED | Vanir Locker Ransomware |
⬆️ |
2025-08-20 |
http://6xdpj3sb5kekvq5ulym5qqmzsv6ektjgvpmajns3qrafgxtyxrhokfqd.onion |
Screen |
404 Not Found |
⬇️ |
2025-08-20 |
http://6xdpj3sb5kekvq5ulym5qqmzsv6ektjgvpmajns3qrafgxtyxrhokfqd.onion/assets/index-6d8af759.js |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
Never |
http://restoredz4xpmuqr.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://vfokxcdzjbpehgit223vzdzwte47l3zcqtafj34qrr26htjo4uf3obid.onion |
|
None |
⬇️ |
2021-05-01 |
http://746pbrxl7acvrlhzshosye3b3udk4plurpxt2pp27pojfhkkaooqiiqd.onion |
|
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://4hzyuotli6maqa4u.onion |
|
Vice Society - Official Site |
⬇️ |
2023-12-14 |
http://vsociethok6sbprvevl4dlwbqrzyhxcxaqpvcqt5belwvsuxaxsutyad.onion |
Screen |
Vice Society - Official Site |
⬇️ |
2023-12-14 |
http://ml3mjpuhnmse4kjij7ggupenw34755y4uj7t742qf7jg5impt5ulhkid.onion/ |
Screen |
Vice Society - Official Site |
⬇️ |
2023-12-14 |
http://ssq4zimieeanazkzc5ld4v5hdibi2nzwzdibfh5n5w4pw5mcik76lzyd.onion/ |
Screen |
Vice Society - Official Site |
⬇️ |
2023-12-14 |
http://wmp2rvrkecyx72i3x7ejhyd3yr6fn5uqo7wfus7cz7qnwr6uzhcbrwad.onion |
Screen |
None |
⬇️ |
Never |
http://xu66gzit6zp22qvixpenlxu2ok7vzrpqvgkuupkiukpz47va47ewbwad.onion |
|
None |
⬇️ |
Never |
http://tahnytazh47jpikpajm2so2jdsjrkx6gfcu4p7bu7u3vfarnpvshgeyd.onion/ |
|
None |
⬇️ |
Never |
http://ecdmr42a34qovoph557zotkfvth4fsz56twvwgiylstjup4r5bpc4oad.onion/ |
|
Description
aka Onix/Onyx
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
VSOP NEWS |
⬇️ |
2023-01-02 |
http://mrdxtxy6vqeqbmb4rvbvueh2kukb3e3mhu3wdothqn7242gztxyzycid.onion/ |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
Looking for affiliates | VulcanRansomTeam : /d/malware - Dread |
⬆️ |
2025-08-20 |
http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/99fb65e2253ca3b34b83 |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2025-06-16 |
http://fdevb3qh24ak7wujqsf7co4z6fstm5qxvnkkgs62fayztjfjjtqqgsad.onion/ |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
W.A. - Index |
⬆️ |
2025-08-20 |
http://weepangrbqjfsxd2noz4bmolztnqsma3vw4c6qfnbfusadzd2m26emqd.onion/index.php |
Screen |
404 Not Found |
⬇️ |
2025-08-15 |
http://am7hswbi46e3ozxec3msxwwzxebkfulsgonhv5kndzeryc2pu46sxmad.onion/ |
Screen |
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Warlock Client Leaked Data Show |
⬇️ |
2025-06-11 |
http://elqfbcx5nofwtqfookqml7ltx2g6q6tmddys6e25vgu3al2meim6cbqd.onion/ |
Screen |
WarLock Client Data Leak Show |
⬆️ |
2025-08-20 |
http://zfytizegsze6uiswodhbaalyy5rawaytv2nzyzdkt3susbewviqqh7yd.onion/ |
Screen |
|
⬆️ |
2025-08-20 |
http://ocwjy4ynmpbbzhumh2ama2vl3bc77lf5auqf7nf4k45lbmzoep2rbyid.onion/ |
Screen |
Description
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2024-12-18 |
http://weaxorpemwzoxg5cdvvfd77p3qczkxqii37ww4foo2n4jcft3mytbpyd.onion/ |
|
Description
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
werewolves.pro |
⬆️ |
2025-08-20 |
https://werewolves.pro |
Screen |
|
⬆️ |
2025-08-20 |
https://weerwolven.biz/en/ |
Screen |
Description
Appears to be a Data Extortion group with no encryption.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
|
⬇️ |
2025-03-07 |
http://xtxtpqpyaaek4p4525ksepyyy75gfvi47fptm2gftw7cn656rnfhzdqd.onion/leaks |
Screen |
Weyhro File Storage |
⬇️ |
2025-07-10 |
http://p7teg7yh2dwxg2tsbgnki3zrt5p7wgaegtfh4cobeqbhcq55nwt2m6yd.onion/ |
Screen |
Weyhro File Storage |
⬇️ |
2025-07-10 |
http://p7teg7yh2dwxg2tsbgnki3zrt5p7wgaegtfh4cobeqbhcq55nwt2m6yd.onion/files/?share=I1Ny5ax |
Screen |
Weyhro |
⬆️ |
2025-08-20 |
http://weyhro27ruifvuqkk3hxzcrtxv2lsalntxgkv6q2j3znkhdqudz54rqd.onion/leaks |
Screen |
Weyhro |
⬆️ |
2025-08-20 |
http://weyhro.hk |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Group is connected to Qilin.
Links
Page title |
Available |
Last visit |
URL |
Screen |
WikiLeaks |
⬇️ |
2024-07-09 |
https://wikileaksv2.com |
Screen |
WikiLeaks V2 - New Version of the Legendary WikiLeaks Project |
⬇️ |
2025-03-03 |
https://31.41.244.100/ |
Screen |
wikileaks2.site | 522: Connection timed out |
⬆️ |
2025-08-20 |
https://wikileaks2.site/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Discord |
⬆️ |
2025-08-20 |
https://discord.com/invite/jjZQdDNnG |
Screen |
Description
History and Origins
Origins: Formerly known as "Hunters International," active since late 2023, and believed to be a reincarnation of the Hive group.
Rebranding: In January 2025, Hunters International ceased file-encrypting attacks and reemerged under the WorldLeaks banner, focusing solely on data theft and extortion.
Tactics, Techniques, and Objectives
Model: Operates as an "extortion-as-a-service" (EaaS) platform. Affiliates are provided with tools to automatically extract data.
Exfiltration & Publication: Theft of sensitive data followed by a threat of publication on a Tor site if the victim refuses to pay
No encryption: The group abandons file encryption to focus on theft, reducing complexity and risk
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
World Leaks |
⬆️ |
2025-08-20 |
https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
xing use a custom mountlocker exe
Links
Page title |
Available |
Last visit |
URL |
Screen |
星Team News |
⬇️ |
2022-01-24 |
http://xingnewj6m4qytljhfwemngm7r7rogrindbq7wrfeepejgxc3bwci7qd.onion/ |
|
None |
⬇️ |
Never |
http://zckdr5wmbzxphoem77diqb2ome2a54o23jl2msz3kmotjlpdnjhmn6yd.onion |
|
None |
⬇️ |
Never |
http://duxht3zdnb2dmq34o5w3tyzpy2kgylidnpaxsn2a7lcxoofb6hqmu7qd.onion/ |
|
None |
⬇️ |
Never |
http://hceesrsg6f5p4gcph4j6jv6vl4mkmaik735oz4r45lgjfyedsxfoprad.onion/ |
|
None |
⬇️ |
Never |
http://qfgh2lpslhjb33z3wsenmqrxcdragelinvcpowlgkbjca6yig5zloeyd.onion/ |
|
None |
⬇️ |
Never |
http://tpze4yo74m6qflef.onion/ |
|
None |
⬇️ |
Never |
http://ikrah6fb4e6r2raxkyvyoxp22jam5z6ak5ajfnzxutmassoagvr2bhad.onion/ |
|
None |
⬇️ |
Never |
http://ibih5znjxf2cqgo737xmooyvmxhac45wd4rivh6n5hd7fysn42g3fayd.onion/ |
|
None |
⬇️ |
Never |
http://z4cn6lpet4y4r6mdlbpklpcrjdruwb6kiuvxn6gsiuoub23z6prlx6ad.onion/ |
|
None |
⬇️ |
Never |
http://yk7erwdvj4vxcgiq3gmcufkben4bk4ixddl5j2xvu7gurtdq754jmiad.onion/ |
|
None |
⬇️ |
Never |
http://3klsbd4dwj3yqgo4xpogfgwqkljbnbdxjryeqks2cjion5jj33wvkqyd.onion/ |
|
None |
⬇️ |
Never |
http://x4mjvffmytkw3hyu.onion/ |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://wj3b2wtj7u2bzup75tzhnso56bin6bnvsxcbwbfcuvzpc4vcixbywlid.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Ransomware.
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Yanluowang |
⬇️ |
2022-11-01 |
http://jukswsxbh3jsxuddvidrjdvwuohtsy4kxg2axbppiyclomt2qciyfoad.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
2021-05-01 |
http://zeonrefpbompx6rwdqa5hxgtp2cxgfmoymlli3azoanisze33pp3x3yd.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
Description
Zeppelin ransomware is a derivative of the Delphi-based Vega malware family and functions as a Ransomware as a Service (RaaS). From 2019 through at least June 2022, actors have used this malware to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries. Zeppelin actors have been known to request ransom payments in Bitcoin, with initial amounts ranging from several thousand dollars to over a million dollars.
Zeppelin actors gain access to victim networks via RDP exploitation [T1133], exploiting SonicWall firewall vulnerabilities [T1190], and phishing campaigns [T1566]. Prior to deploying Zeppelin ransomware, actors spend one to two weeks mapping or enumerating the victim network to identify data enclaves, including cloud storage and network backups [TA0007]. Zeppelin actors can deploy Zeppelin ransomware as a .dll or .exe file or contained within a PowerShell loader.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-223a
Links
Page title |
Available |
Last visit |
URL |
Screen |
parsing : enabled
Links
Page title |
Available |
Last visit |
URL |
Screen |
Zero Tolerance |
⬇️ |
2024-05-20 |
http://zhuobnfsddn2myfxxdqtpxk367dqnntjf3kq7mrzdgienfxjyllq4rqd.onion/ |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
403 Forbidden |
⬇️ |
2025-08-20 |
http://ghfuviaplse6nbeowu7ghhid5hdowutbwbrv77aqgwco2b2ntgj3auad.onion |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |
None |
⬇️ |
Never |
http://zeta-leaks.onion |
|
Links
Page title |
Available |
Last visit |
URL |
Screen |
Links
Page title |
Available |
Last visit |
URL |
Screen |