Inactive ransomware operator
← All groupscryptomix
aka Zeta · 1 victims indexed · first seen 9 years ago · last activity 9 years ago
At a glance
- Status
- inactive
- Aliases
- Zeta
- First seen
- 9 years ago
- Last activity
- 9 years ago
- Primary sector
- Government Facilities · 1 hits
About
References
14 linksExternal sources curated by the MISP threat-intel community.
- nyxbone.com/malware/CryptoMix.html
- cert.pl/en/news/single/technical-analysis-of-cryptomixcryptfile2-ransomware/
- twitter.com/JakubKroustek/status/804009831518572544
- bleepingcomputer.com/news/security/new-empty-cryptomix-ransomware-variant-released/
- bleepingcomputer.com/news/security/0000-cryptomix-ransomware-variant-released/
- bleepingcomputer.com/news/security/xzzx-cryptomix-ransomware-variant-released/
- bleepingcomputer.com/news/security/test-cryptomix-ransomware-variant-released/
- bleepingcomputer.com/news/security/work-cryptomix-ransomware-variant-released/
- bleepingcomputer.com/news/security/system-cryptomix-ransomware-variant-released/
- bleepingcomputer.com/news/security/mole66-cryptomix-ransomware-variant-released/
- bleepingcomputer.com/news/security/new-backup-cryptomix-ransomware-variant-actively-infecting-users/
- twitter.com/demonslay335/status/1072227523755470848
- coveware.com/blog/cryptomix-ransomware-exploits-cancer-crowdfunding
- bleepingcomputer.com/news/security/cryptomix-ransomware-exploits-sick-children-to-coerce-payments/
Timeline
1 monthsTop countries
Top sectors
MITRE ATT&CK
3 techniques · 3 tacticsTactics
Recent victims
Loading…
Source
Updated 9 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
