Inactive ransomware operator
← All groupsegregor
6 victims indexed · first seen 6 years ago · last activity 5 years ago
At a glance
- Status
- inactive
- First seen
- 6 years ago
- Last activity
- 5 years ago
- Primary sector
- Commercial Facilities · 3 hits
About
References
8 linksExternal sources curated by the MISP threat-intel community.
- appgate.com/news-press/appgate-labs-analyzes-new-family-of-ransomware-egregor
- bleepingcomputer.com/news/security/crytek-hit-by-egregor-ransomware-ubisoft-data-leaked/
- cybersecuritynews.com/egregor-ransomware/
- securityboulevard.com/2020/10/egregor-sekhmets-cousin/
- ransomlook.io/group/egregor
- bleepingcomputer.com/news/security/egregor-ransomware-linked-to-maze-arrests-made-in-ukraine/
- trendmicro.com/en_us/research/20/k/egregor-ransomware-emerges-as-maze-shuts-down-operations.html
- zdnet.com/article/egregor-ransomware-gang-arrested-in-ukraine/
Timeline
4 monthsTop countries
Top sectors
MITRE ATT&CK
5 techniques · 5 tacticsTactics
Recent victims
Loading…
Source
Updated 5 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
