Inactive ransomware operator
← All groupscyclops
7 victims indexed · first seen 3 years ago · last activity 3 years ago
At a glance
- Status
- inactive
- First seen
- 3 years ago
- Last activity
- 3 years ago
- Onion sites
- 1 known endpoint
About
References
6 linksExternal sources curated by the MISP threat-intel community.
- ransomlook.io/group/cyclops
- sentinelone.com/anthology/knight/
- kelacyber.com/blog/cyclops-ransomware-gang-unveils-knight-raas/
- wwwmicrosoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom%3AWin64%2FKnight.ZB!MTB
- cloudsek.com/ar/blog/understanding-knight-ransomware-advisory-analysis
- quorumcyber.com/malware-reports/knight-ransomware-report/
Timeline
1 monthsTop countries
MITRE ATT&CK
4 techniques · 3 tacticsTactics
Recent victims
Loading…
Onion infrastructure
1 known- http://nt3rrzq5hcyznvdkpslvqbbc2jqecqrinhi5jtwoae2x7psqtcb6dcad.onion/blogs/79b2eb61-97e2-4a2e-81f8-1c1d45c3b59c
Source
Updated 3 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
