Ransomware Group:  
Ransomed



Sponsored by Hudson RockUse Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business


Sites | Activity | Worldmap | Victims (68)


Sites

Title Available Last Visit FQDN Screenshot
None 🔴 2023-09-07 12:50:16.467707 ransomed.vc N/A
404 Not Found 🔴 2023-09-01 10:54:37.941776 k63fo4qmdnl4cbt54sso3g6s5ycw7gf7i6nvxl3wcf3u6la2mlawt5qd.onion N/A
Ransomedvc – Leading Agency In Digital Peace – Ran 🔴 2023-11-06 06:57:10.463542 f6amq3izzsgtna4vw24rpyhy3ofwazlgex2zqdssavevvkklmtudxjad.onion N/A
Ransomed 🔴 2023-11-18 16:00:38.878850 g6ocfx3bb3pvdfawbgrbt3fqoht5t6dwc3hfmmueo76hz46qepidnxid.onion N/A

Activity over time

Worldmap

68 Victims

 flag

RANSOMEDVC is for sale 

Company logo
Ransomware Group:

Discovery Date: 2023-10-30 11:25

Sector:
I do not want to continue being monitored by federal agencies and i would wish to sell the project to someone who will want to continue it. We are selling everything. IN PACKAGE: Domains 1 Ransomware Builder = 100% FUD – Bypassing all AV’s and automatically infecting all LAN device’s inside network.. – automatically escalate…

Victim:   |  Group: 
 flag

Ransomedvc Launches A forum 

Company logo
Ransomware Group:

Discovery Date: 2023-10-22 19:13

Sector:
Visit us: http://[redacted].onion

Victim:   |  Group: 
 flag

We Hire Pentesters(5BTC Payout) 

Company logo
Ransomware Group:

Discovery Date: 2023-10-20 19:16

Sector:
@RansomedSupport on telegram to join Ransomed.vc is in need of only advanced pentesters, our jobs are one of the highest paid you can ever find. If you have the skills, be so kind and come earn what you deserve. @RansomedSupport to join.

Victim:   |  Group: 
 flag

Ransomedvc Pentest Services! 

Company logo
Ransomware Group:

Discovery Date: 2023-10-16 17:33

Sector:
Ransomedvc now offers pentesting services! share your targets with us on @RansomedSupport on telegram. Guaranteed results!

Victim:   |  Group: 
 flag

RE : Clarification 

Company logo
Ransomware Group:

Discovery Date: 2023-10-16 02:35

Sector:
Third-party involvement in the editing of the last 2 posts cannot be more obvious, considering the English is far more fluent than previous posts made by RansomedVC. We have no direct, or indirect affiliation(s) with RansomedVC on an operational level. They have not been compensated financially or otherwise for this. We both share the sole…

Victim:   |  Group: 
 flag

Rob Lee Evidence : Sneak Peek 

Company logo
Ransomware Group:

Discovery Date: 2023-10-16 02:34

Sector:
Note : Threat actor Rob Lee has failed to cooperate with the demands made by us, including an admission of guilt & wrongdoing, and an immediate resignation. Therefore, we must expose Rob Lee for who he is – a threat actor working under the guise of a powerful executive, who is in this solely for…

Victim:   |  Group: 
 flag

Colonial Pipeline Company 

Company logo
Ransomware Group:

Discovery Date: 2023-10-15 14:47

Sector:
Threat actors – they hide amongst us. It is becoming increasingly difficult to differentiate these bad actors from our heroic cyber front-line responders, who work night & day to protect their clients from ever-growing cyber threats. In fact, as we’ll discuss here, some of these threat actors operate under the guise of powerful cyber-security executives.…

Victim:   |  Group: 
 flag

Accenture Breach Evidence & Debunking Rob Lee’s Lies 

Company logo
Ransomware Group:

Discovery Date: 2023-10-15 14:46

Sector:
How ironic! Rob Lee, the outed threat actor, working under the guise of a seasoned cyber-security professional, recently tweeted the above, in an attempt to throw shade at the various claims made about him. In one such email exchange, Rob asks Dragos colleague Nanci Uher for her thoughts on using stolen data from the Accenture…

Victim:   |  Group: 
 flag

webpag.com.br database leaked 

Company logo
Ransomware Group:

Discovery Date: 2023-10-15 14:46

Sector:

Victim:   |  Group: 
 flag

Metroclub.org 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:05

Sector:
We successfully extracted the entire content of the metroclub.org website, belonging to Metroclub, a private club based in Washington, D.C. The extracted data amounts to 2.1 terabytes. The accompanying screenshot provides a glimpse of critical information, although we are still in the process of collecting additional data. Our haul includes the complete membership list, employee…

Victim:   |  Group: 
 flag

Optimity UK 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:04

Sector:
We’ve successfully obtained control of their entire Azure cloud environment, which now resides under our supervision. Regrettably for them and fortunately for us, we’ve also secured access to data from over 1000 companies that were utilizing their cloud services. In the event that Optimity does not comply with our demands, we will begin to initiate…

Victim:   |  Group: 
 flag

Baumit Bulgaria 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:04

Sector:
We have successfuly obtained all data from Balmit.bg. We have got all of their data + source + private data from their servers.We require a ransom of $100,000 $80,000 Deal of the day

Victim:   |  Group: 
BR flag

novoingresso.com.br 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:03

Sector:
Our group was able to access everything from the main company servers, and it happened that their data was on the server too(shared) Sample: https://qu.ax/LHRf.gz

Victim:   |  Group: 
BR flag

webpag.com.br 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:02

Sector:
Sample: https://qu.ax/LHRf.gOur group was able to access everything from the main company servers, and it happened that their data was on the server too(shared) Sample: https://qu.ax/LHRf.gz

Victim:   |  Group: 
BR flag

rodoviariaonline.com.br 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:02

Sector:
Our group was able to access everything from the main company servers, and it happened that their data was on the server too(shared) Sample: https://qu.ax/LHRf.gz

Victim:   |  Group: 
 flag

Kasida.bg Database Leaked, Download 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:01

Sector:
https://qu.ax/nUmY.7z

Victim:   |  Group: 
 flag

I&G Brokers Database, Download Now 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:01

Sector:
https://qu.ax/nEqR.7z

Victim:   |  Group: 
 flag

pilini.bg Database, Download Now! 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 08:00

Sector:
https://qu.ax/fiSD.sql

Victim:   |  Group: 
 flag

iLife.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 07:59

Sector:
https://qu.ax/danH.7z

Victim:   |  Group: 
 flag

Fuck Palestine! We buy your access!! 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 07:59

Sector:
Ransomedvc is now buying access on gaza countries + iran. message our admins!

Victim:   |  Group: 
 flag

NEW TWITTER 

Company logo
Ransomware Group:

Discovery Date: 2023-10-13 07:58

Sector:
Tweets by RansomedSupport

Victim:   |  Group: 
 flag

DallBogg Breach 

Company logo
Ransomware Group:

Discovery Date: 2023-10-07 13:30

Sector:
We have taken everything from your servers, you failed to contact us back, contact ASAP to fix. We are in charge of user data, id photos and a lot more. sample1 : https://qu.ax/bcmm.7z sample2: https://qu.ax/uYyy.7z

Victim:   |  Group: 
 flag

Partnership With Breachforums 

Company logo
Ransomware Group:

Discovery Date: 2023-10-07 13:29

Sector:
links: http://[redacted].onion/ https://breachforums.is/ Our group has decided to partner with a forum we did not really believe into first. We had thoughts the project is dead, but wait, It ISNT. Our team has seen breachforums is keeping their operation way more serious than ever, this means our team will and would use their forum to…

Victim:   |  Group: 
JP flag

NTT Docomo 

Company logo
Ransomware Group:

Discovery Date: 2023-10-06 12:47
Estimated Attack Date: 2023-10-04

Sector:
With approximately 310,000 employees worldwide, NTT (Nippon Telegraph and Telephone Corporation) is one of the world’s leading telecommunications carriers. It is chosen by as many as 88% of the top 100 companies in the Fortune Global Business Ranking “Fortune 500”, an annual U.S. business magazine. We offer a wide range of services in Japan, from…

Victim:   |  Group: 
 flag

(SALE) District Of Columbia Elections 600k lines VOTERS DATA 

Company logo
Ransomware Group:

Discovery Date: 2023-10-06 12:46
Estimated Attack Date: 2023-10-05

Sector:
We have successfully breached the District of Columbia Board Of Elections and have gotten more than 600k lines of USA Voters: see a small sample here: https://paste.ec/raw/UhDgH8I8#ub86MOR2-yKYUVcuZRbXXW5hQzBXYIHWTmvntzHSEE1 Contact us at https://t.me/RansomedSupport

Victim:   |  Group: 
 flag

gov.la 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23
Estimated Attack Date: 2023-09-16

Sector:
Did I hear gov? Yep. We have accessed the majorty of their servers that were storing personal data, Passport Data,SSNs,NAMES,ADDRESSES and a lot moreWe require a ransom of $50,000

Victim:   |  Group: 
 flag

mango.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23
Estimated Attack Date: 2023-09-25

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $15,000

Victim:   |  Group: 
 flag

ebag.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23
Estimated Attack Date: 2023-09-25

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $15,000

Victim:   |  Group: 
 flag

popolo.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23
Estimated Attack Date: 2023-09-25

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $15,000

Victim:   |  Group: 
 flag

andrews.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23
Estimated Attack Date: 2023-09-25

Sector:
We will leak all of the info we have on you if dont get paid.We require a ransom of $15,000

Victim:   |  Group: 
 flag

ardes.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23
Estimated Attack Date: 2023-09-25

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $50,000

Victim:   |  Group: 
 flag

myshoes.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23
Estimated Attack Date: 2023-09-25

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $15,000

Victim:   |  Group: 
 flag

ecco.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $15,000

Victim:   |  Group: 
 flag

districtshoes.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $15,000

Victim:   |  Group: 
 flag

footshop.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $15,000

Victim:   |  Group: 
 flag

Punto.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $30,000

Victim:   |  Group: 
 flag

bnm.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23

Sector:
We will leak all of the info we have on you if we dont get paid.We require a ransom of $14,000

Victim:   |  Group: 
JP flag

SONY.COM 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23

Sector:
Sony Group Corporation, formerly Tokyo Telecommunications Engineering Corporation, and Sony Corporation, is a Japanese multinational conglomerate corporation headquartered in Minato, Tokyo, JapanWe have successfully compromissed all of sony systems. We wont ransom them! we will sell the data. due to sony not wanting to pay. DATA IS FOR SALE----- File tree:linkSample Of Data:link-----WE ARE SELLING IT

Victim:   |  Group: 
JP flag

NTT Docomo - Japan 1st Mobile Operator 

Company logo
Ransomware Group:

Discovery Date: 2023-09-26 03:23

Sector:
With approximately 310,000 employees worldwide, NTT (Nippon Telegraph and Telephone Corporation) is one of the world's leading telecommunications carriers. It is chosen by as many as 88% of the top 100 companies in the Fortune Global Business Ranking "Fortune 500", an annual U.S. business magazine. We offer a wide range of services in Japan, from fixed-line and mobile phones to the Internet and system integration.We have got into their base and exfiltrated everything from there, we dont get paid.We require a ransom of $1,015,000

Victim:   |  Group: 
 flag

airelec.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-09 15:07

Sector:
All of your customer data,records and private documents are mine now, if you pay you wiWe require a ransom of $8,000

Victim:   |  Group: 
 flag

pilini.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-09 15:07

Sector:
You have been hacked, all your data is now mine, if you want to get your backups back you will have to pay us.We require a ransom of $8,000

Victim:   |  Group: 
 flag

kasida.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-09 15:07

Sector:
We have been able to access all of linktera critical infrastructure including her database, we dumped and then deleted all backups from the serversWe require a ransom of $8,000

Victim:   |  Group: 
 flag

proxy-sale.com 

Company logo
Ransomware Group:

Discovery Date: 2023-09-09 15:07

Sector:
We have been able to access all of linktera critical infrastructure including the database, we dumped and then deleted all backups from the serversWe require a ransom of $12,000

Victim:   |  Group: 
 flag

Linktera 

Company logo
Ransomware Group:

Discovery Date: 2023-09-08 07:02

Sector:
We have been able to access all of linktera critical infrastructure including her database, we dumped and then deleted all backups from the serversWe require a ransom of $23,000

Group: 
US flag

easydentalcare.us 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 20:39

Sector:
We Have accessed all of the critical infrasrtucture of the company, we are on our way to publish all of the data, if not paidArchive SnapshotWe require a ransom of $18,000

Victim:   |  Group: 
 flag

quantinuum.com 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 20:39

Sector:
we have access everything on their servers, including the Database, and other non public documents.

Victim:   |  Group: 
 flag

laasr.eu 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 20:39

Sector:
we have access everything on their servers, including the Database, and other non public documents.We require a ransom of$11,000$10,000

Victim:   |  Group: 
RU flag

medcenter-tambov.ru 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 20:39

Sector:
we have access everything on their servers, including the Database, and other non public documents.We are not going to make them public unless we get paid.We require a ransom of $25,000

Victim:   |  Group: 
 flag

makflix.eu 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 20:39

Sector:
we have access everything on their servers, including the Database,Customers Chats, and other non public documents.We require a ransom of$10,000$9,000

Victim:   |  Group: 
 flag

nucleus.live 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 20:39

Sector:
we have access everything on their servers, including the Database,Customers Chats, Bank Transfer DocumentsArchive SnapshotWe require a ransom of $18,000

Victim:   |  Group: 
 flag

wantager.com 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 20:39

Sector:
we have access everything on their servers, including the Database,Customers Chats, Bank Transfer DocumentsArchive SnapshotWe require a ransom of $10,000

Victim:   |  Group: 
 flag

Swipe.bg 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 14:34

Sector:
We have successfuly obtained all data from Swipe.bg A online marketplace known for its cheap prices. Data we obtained: Userdata,Customer chats,SSNs,Numbers,Addresses and moreWe require a ransom of $50,000.

Victim:   |  Group: 
 flag

Balmit Bulgaria 

Company logo
Ransomware Group:

Discovery Date: 2023-09-04 14:34

Sector:
We have successfuly obtained all data from Balmit.bg. We have got all of their data + source + private data from their servers.We require a ransom of$100,000$80,000

Victim:   |  Group: 
AU flag

phms.com.au 

Company logo
Ransomware Group:

Discovery Date: 2023-09-03 22:47

Sector:
We have hacked and exported the database of phms.com.au. We have gathered root access and access to their mysqlWe require a ransom of $10,000

Victim:   |  Group: 
 flag

paynesvilleareainsurance.com 

Company logo
Ransomware Group:

Discovery Date: 2023-09-03 22:47

Sector:
We have compromissed the servers of paynesvilleareainsurance.com. We decided to make sure they remember us so we have also defaced them.Archive SnapshopWe require a ransom of $10,000

Victim:   |  Group: 
 flag

SKF.com 

Company logo
Ransomware Group:

Discovery Date: 2023-09-03 22:47

Sector:
SKF�s network was compromised(by collaboration withEverest Ransomware Group) a few days ago. The company continues to be silent about the problem.A representative of the company should contact us immediately, instructions have all been sended in the emails.Otherwise, we will start communicating with your competitors.Data stolen : 2.19 TerabytesData Info : Internal Documents, Data Bases, Customer [�]We require a ransom of $100,000

Victim:   |  Group: 
 flag

Hawaii Health System 

Company logo
Ransomware Group:

Discovery Date: 2023-09-01 16:01

Sector:
We were able to dump and deface the official site of the hawaii health system. We demand a ransom not in the form of money but in the form of public Excuse. We want Joe Biden to come with a russian flag in hands and Excuse himselfs for what he did until now.Wayback Archive Snapshot

Group: 
 flag

MetroCLub DC 

Company logo
Ransomware Group:

Discovery Date: 2023-08-31 22:01

Sector:
We were able to dump the entire metroclub.org site. Metroclub is a privte club from DC. There is 2.1TB of data. This screenshot show most of important info but still gathering a lot of data. We have their entire members list and employee data. Source and costumers data.

Group: 
 flag

S&P 

Company logo
Ransomware Group:

Discovery Date: 2023-08-31 12:59

Sector:
Affected nearly 6tb of data. Because of the size of the data I require a payment to the following address only. We demand 200,000 euro. bc1qqc7nla44te4wxyvf9j7zxtc5q296sxn94k6v00

Group: 
 flag

Powersports Marketing 

Company logo
Ransomware Group:

Discovery Date: 2023-08-31 12:59

Sector:
We are in hold of Everything any of their employes ever downloaded or used on their systems. whole cloud has been accessed. We are in hold of 2.1tb of data from their cloud.file tree:download(https://cdn.bunkr.ru/directory_tree-UvBawJCp.txt)

Group: 
 flag

PSM 

Company logo
Ransomware Group:

Discovery Date: 2023-08-28 23:42

Sector:

Victim:   |  Group: 
 flag

Metropolitan Club DC 

Company logo
Ransomware Group:

Discovery Date: 2023-08-27 19:05

Sector:
We were able to dump the entire metroclub.org site. Metroclub is a privte club from DC. There is 2.1TB of data. This screenshot show most of important info but still gathering a lot of data. We have their entire members list and employee data. Source and costumers data.

Victim:   |  Group: 
 flag

State Farm 

Company logo
Ransomware Group:

Discovery Date: 2023-08-26 22:08

Sector:

Victim:   |  Group: 
 flag

Transunion 

Company logo
Ransomware Group:

Discovery Date: 2023-08-23 16:00

Sector:

Victim:   |  Group: 
 flag

Jhooker 

Company logo
Ransomware Group:

Discovery Date: 2023-08-23 15:59

Sector:

Victim:   |  Group: 
GB flag

Optimity.co.uk 

Company logo
Ransomware Group:

Discovery Date: 2023-08-23 15:59

Sector:
Their whole azure cloud was exported and is now in our hands. luckly and sadly for them we have taken access to more than 1000 companies data they have stored on their cloud. if optimity does not pay we will start ransoming them, one by one.Size of the leak is 5tb

Victim:   |  Group: 
BG flag

I&G Brokers 

Company logo
Ransomware Group:

Discovery Date: 2023-08-21 18:30

Sector:
I&G brokers are top top favourite Bulgarian Broker houses.First Payment Due, leaking dataDownload Sample(https://pomf2.lain.la/f/XXXXXX.7z)

Victim:   |  Group: 
 flag

A1 

Company logo
Ransomware Group:

Discovery Date: 2023-08-21 18:30

Sector:
A1 Data Provider (1/4 partial payments have been paid on 2023-08-23)

Victim:   |  Group: