Inactive ransomware operator
← All groupsNightsky
2 victims indexed · first seen 4 years ago · last activity 4 years ago
At a glance
- Status
- inactive
- First seen
- 4 years ago
- Last activity
- 4 years ago
- Onion sites
- 1 known endpoint
About
References
9 linksExternal sources curated by the MISP threat-intel community.
- twitter.com/cglyer/status/1480734487000453121
- twitter.com/cglyer/status/1480742363991580674
- bleepingcomputer.com/news/security/night-sky-is-the-latest-ransomware-targeting-corporate-networks/
- cynet.com/attack-techniques-hands-on/threats-looming-over-the-horizon/
- microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation
- microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself
- secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader
- youtube.com/watch?v=Yzt_zOO8pDM
- ransomlook.io/group/nightsky
Timeline
1 monthsMITRE ATT&CK
4 techniques · 3 tacticsTactics
Recent victims
Loading…
Onion infrastructure
1 known- http://gg5ryfgogainisskdvh4y373ap3b2mxafcibeh2lvq5x7fx76ygcosad.onion
Source
Updated 4 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
