0 0
Read Time:1 Minute, 53 Second

Yesterday IceFire Ransomware gang rich people made a new leakage website on the Darkweb for leaking data to the places they hacked or hacked and then encrypted their files, the important thing is that they are working on the site. Or the victim as shown in the pictures. Run a button named jump. The first thing you click on it will take you to a new page from which you can download all the data of the place that was hacked through IceFire. Of course, the data sizes are relatively large according to each place, so you can find the victim with his leaked data 100 GB, maybe 80 GB, more possible, less, and so, I’m not in my habit to download links to any leak or website on the dark web, but let people investigate. Would you like to investigate the leakage website of IceFire on the dark web that you will find everything on:

http://kf6x3mjeqljqxjznaw65jixin7dpcunfxbbakwuitizytcpzn4iy5bad.onion/board/leak_list/

IceFire also made a nice movement that you will not find all the places or victims. It says who is friendly, and I think that this is an IceFire movement to work on negotiations with these victims and let them pay instead of what they know to the whole world that they have been hacked and their names are coming down

The important thing is that the IceFire gang gave 5 days a chance to the places or the victims who hacked it, that they pay or publish all their data without exception
In general, not all data is available for download through the users. When you click on the button called jump, it takes you to the download page. The first time you press download, you will find it telling you that as soon as the data will be available for users to download, if of course these places are not paid, and in general all the victim has a password For his data, some of them whose password has been published, and some of them whose password is not yet published, and whose name has not been published, so almost negotiations are still working with these places, or among them who have already paid so that you don’t know who it is.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence