Inactive ransomware operator
← All groupslocky
aka Locky-Odin, Locky-Osiris, Locky-Osiris 2016, Locky-Osiris 2017 · 3 victims indexed · first seen 10 years ago · last activity 9 years ago
At a glance
- Status
- inactive
- Aliases
- Locky-Odin, Locky-Osiris, Locky-Osiris 2016, Locky-Osiris 2017
- First seen
- 10 years ago
- Last activity
- 9 years ago
- Primary sector
- Emergency Services · 1 hits
About
References
6 linksExternal sources curated by the MISP threat-intel community.
- bleepingcomputer.com/news/security/new-locky-version-adds-the-zepto-extension-to-encrypted-files/
- blog.trendmicro.com/trendlabs-security-intelligence/new-locky-ransomware-spotted-in-the-brazilian-underground-market-uses-windows-script-files/
- nakedsecurity.sophos.com/2016/10/06/odin-ransomware-takes-over-from-zepto-and-locky/
- bleepingcomputer.com/news/security/locky-ransomware-switches-to-egyptian-mythology-with-the-osiris-extension/
- id-ransomware.blogspot.com/2016/02/locky.html
- ransomlook.io/group/locky
Timeline
3 monthsTop countries
Top sectors
MITRE ATT&CK
4 techniques · 4 tacticsTactics
Recent victims
Loading…
Source
Updated 9 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
