Inactive ransomware operator
← All groupsMidas
44 victims indexed · first seen 4 years ago · last activity 4 years ago
At a glance
- Status
- inactive
- First seen
- 4 years ago
- Last activity
- 4 years ago
- Onion sites
- 2 known endpoints
- Primary sector
- Food & Agriculture · 1 hits
About
References
4 linksExternal sources curated by the MISP threat-intel community.
- news.sophos.com/en-us/2022/01/25/windows-services-lay-the-groundwork-for-a-midas-ransomware-attack/
- securityboulevard.com/2022/03/midas-ransomware-tracing-the-evolution-of-thanos-ransomware-variants/
- zscaler.com/blogs/security-research/midas-ransomware-tracing-evolution-thanos-ransomware-variants
- ransomlook.io/group/midas
Timeline
6 monthsTop countries
Top sectors
MITRE ATT&CK
4 techniques · 4 tacticsTactics
Recent victims
Loading…
Onion infrastructure
2 known- http://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad.onion
- http://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad.onion/blog.php
Source
Updated 4 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
