Active ransomware operator
← All groupsdevman
184 victims indexed · first seen 1 year ago · last activity 4 months ago
At a glance
- Status
- active
- First seen
- 1 year ago
- Last activity
- 4 months ago
- Onion sites
- 1 known endpoint
- Primary sector
- Not Found · 94 hits
About
References
5 linksExternal sources curated by the MISP threat-intel community.
- ransomlook.io/group/devman
- medium.com/@anyrun/devman-ransomware-analysis-of-new-dragonforce-variant-ede707fd30b1
- broadcom.com/support/security-center/protection-bulletin/devman-a-new-dragonforce-ransomware-variant
- watchguard.com/wgrd-security-hub/ransomware-tracker/devman
- hivepro.com/threat-advisory/devman-ransomware-is-a-new-derivative-of-the-dragonforce-family/
Timeline
11 monthsTop countries
Top sectors
MITRE ATT&CK
4 techniques · 3 tacticsTactics
Recent victims
Loading…
Onion infrastructure
1 known- http://devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion/
Source
Updated 4 months agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
