Ransomware Groups

Excelitte Logo
Group Name Group Link Activity Status Last Known Activity Date Description Screenshot
karma https://www.ransomware.live/group/karma offline None No Screenshot Available
interlock https://www.ransomware.live/group/interlock offline None No Screenshot Available
icefire https://www.ransomware.live/group/icefire offline None No Screenshot Available
lockbit2 https://www.ransomware.live/group/lockbit2 offline None No Screenshot Available
holyghost https://www.ransomware.live/group/holyghost offline None No Screenshot Available
hotarus https://www.ransomware.live/group/hotarus offline None No Screenshot Available
hive https://www.ransomware.live/group/hive offline None Hive is a strain of ransomware that was first discovered in June 2021. Hive was designed to be used by Ransomware-as-a-service providers, to enable novice cyber-criminals to launch ransomware attacks on healthcare providers, energy providers, charities, and retailers across the globe. In 2022 there was a switch from GoLang to Rust. No Screenshot Available
incransom https://www.ransomware.live/group/incransom online None Screenshot
hellogookie https://www.ransomware.live/group/hellogookie offline None No Screenshot Available
hellokitty https://www.ransomware.live/group/hellokitty offline None Unit42 states that HelloKitty is a ransomware family that first surfaced at the end of 2020, primarily targeting Windows systems. The malware family got its name due to its use of a Mutex with the same name: HelloKittyMutex. The ransomware samples seem to evolve quickly and frequently, with different versions making use of the .crypted or .kitty file extensions for encrypted files. Some newer samples make use of a Golang packer that ensures the final ransomware code is only loaded in memory, most likely to evade detection by security solutions. No Screenshot Available
haron https://www.ransomware.live/group/haron offline None No Screenshot Available
helldown https://www.ransomware.live/group/helldown offline None No Screenshot Available
hunters https://www.ransomware.live/group/hunters online None In mid-October 2023, just a few days before the Europol operation, the source code of the Ransomware Hive was sold, along with its website and older versions developed in Golang and C (although this purchase has only been reported by the actors without concrete evidence). The buyer of this new source code was the group Hunters International, who claimed to have fixed the bugs in the Ransomware Hive that were responsible for preventing file decryption in some cases. The group also stated that file encryption would not be their primary focus; instead, they would use data theft as a method to pressure victims during extortion attempts. Screenshot
hades https://www.ransomware.live/group/hades offline None According to PCrisk, Hades Locker is an updated version of WildFire Locker ransomware that infiltrates systems and encrypts a variety of data types using AES encryption. Hades Locker appends the names of encrypted files with the .~HL[5_random_characters] (first 5 characters of encryption password) extension. No Screenshot Available
handala https://www.ransomware.live/group/handala online None Not a Ransomware Group Screenshot
groove https://www.ransomware.live/group/groove offline None No Screenshot Available
grief https://www.ransomware.live/group/grief offline None Doppelpaymer is a ransomware family that encrypts user data and later on it asks for a ransom in order to restore original files. It is recognizable by its trademark file extension added to encrypted files: .doppeled. It also creates a note file named: No Screenshot Available
freecivilian https://www.ransomware.live/group/freecivilian offline None No Screenshot Available
fsteam https://www.ransomware.live/group/fsteam offline None New possible leak site posted to a forum on November 20th, 2022, no victims at present. Unclear if its for a ransomware or extortion group No Screenshot Available
fog https://www.ransomware.live/group/fog online None Fog, which uses the .flocked extension for encrypted files, was first observed in May in campaigns by Storm-0844, a threat actor known for distributing Akira. By June, Storm-0844 was deploying Fog more than Akira. Screenshot
exorcist https://www.ransomware.live/group/exorcist offline None According to PCrisk, Exorcist is a ransomware-type malicious program. Systems infected with this malware experience data encryption and users receive ransom demands for decryption. During the encryption process, all compromised files are appended with an extension consisting of a ransom string of characters.For example, a file originally named No Screenshot Available
flocker https://www.ransomware.live/group/flocker online None Screenshot
ep918 https://www.ransomware.live/group/ep918 offline None No Screenshot Available
everest https://www.ransomware.live/group/everest online None Everest ransom group collects and analyzes information about their victims. They specialize in customer privacy data, financial information, databases, credit card information, and more. The Everest ransom group leaks the victim's data to the darknet and they announced that any victim that will not contact them will suffer from a data leak and they will not delete hist files for future usage. Screenshot
entropy https://www.ransomware.live/group/entropy offline None Entropy is a ransomware first seen in 1st quarter of 2022, is being used in conjunction of Dridex infection. The ransomware uses a custom packer to pack itself which has been seen in some early dridex samples. No Screenshot Available
embargo https://www.ransomware.live/group/embargo online None Screenshot
ech0raix https://www.ransomware.live/group/ech0raix offline None The QNAPCrypt ransomware works similarly to other ransomware, including encrypting all files and delivering a ransom note. However, there are several important differences:1. The ransom note was included solely as a text file, without any message on the screen—naturally, because it is a server and not an endpoint.2. Every victim is provided with a different, unique Bitcoin wallet—this could help the attackers avoid being traced.3. Once a victim is compromised, the malware requests a wallet address and a public RSA key from the command and control server (C&C) before file encryption. No Screenshot Available
dunghill https://www.ransomware.live/group/dunghill online None Screenshot
donex https://www.ransomware.live/group/donex offline None No Screenshot Available
ElDorado https://www.ransomware.live/group/ElDorado online None In September The El Dorado ransomware group have been rebrand as BlackLock Screenshot
dataleak https://www.ransomware.live/group/dataleak offline None No Screenshot Available
darkvault https://www.ransomware.live/group/darkvault online None Screenshot
darkrace https://www.ransomware.live/group/darkrace offline None No Screenshot Available
darkbit https://www.ransomware.live/group/darkbit offline None No Screenshot Available
darkside https://www.ransomware.live/group/darkside offline None Darkside ransomware group has started its operation in August of 2020 with the model of RaaS (Ransomware-as-a-Service). They have become known for their operations of large ransoms scale. They have announced that they prefer not to attack hospitals, schools, non-profits, and governments, but rather big organizations that can be able to pay large ransoms. Darkside ransomware group became very famous following the cyberattack of the Colonial Pipeline and Toshiba unit. The FBI finally terminate the Darkside operation and Managed to pull money from their wallets back. No Screenshot Available
darkpower https://www.ransomware.live/group/darkpower offline None No Screenshot Available
darkangels https://www.ransomware.live/group/darkangels offline None No Screenshot Available
dAn0n https://www.ransomware.live/group/dAn0n offline None No Screenshot Available
dispossessor https://www.ransomware.live/group/dispossessor offline None This is not a ransomware group but a data broker No Screenshot Available
daixin https://www.ransomware.live/group/daixin online None Screenshot