Inactive ransomware operator
← All groupsHellcat
20 victims indexed · first seen 2 years ago · last activity 1 year ago
At a glance
- Status
- inactive
- First seen
- 2 years ago
- Last activity
- 1 year ago
- Onion sites
- 1 known endpoint
- Primary sector
- Technology · 8 hits
About
References
4 linksExternal sources curated by the MISP threat-intel community.
- ransomlook.io/group/hellcat
- bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/
- securityboulevard.com/2024/11/schneider-electric-hellcat-richixbw/
- infostealers.com/article/schneider-electric-hacked-and-blackmailed-due-to-lumma-infostealer-infection/
Timeline
6 monthsTop countries
Top sectors
MITRE ATT&CK
4 techniques · 4 tacticsTactics
Recent victims
Loading…
Onion infrastructure
1 known- http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion
Source
Updated 1 year agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
