Inactive ransomware operator
← All groupsNokoyawa
36 victims indexed · first seen 3 years ago · last activity 3 years ago
At a glance
- Status
- inactive
- First seen
- 3 years ago
- Last activity
- 3 years ago
- Onion sites
- 6 known endpoints
- Primary sector
- Healthcare · 4 hits
About
References
1 linkExternal sources curated by the MISP threat-intel community.
Timeline
4 monthsTop countries
Top sectors
MITRE ATT&CK
10 techniques · 8 tacticsTactics
Techniques
- T1566Phishing
- T1190Exploit Public-Facing Application
- T1059Command and Scripting Interpreter
- T1027Obfuscated Files or Information
- T1082System Information Discovery
- T1083File and Directory Discovery
- T1021Remote Services
- T1005Data from Local System
- T1041Exfiltration Over C2 Channel
- T1486Data Encrypted for Impact
Recent victims
Loading…
Onion infrastructure
6 known- http://6yofnrq7evqrtz3tzi3dkbrdovtywd35lx3iqbc5dyh367nrdh4jgfyd.onion
- http://lirncvjfmdhv6samxvvlohfqx7jklfxoxj7xn3fh7qeabs3taemdsdqd.onion
- http://lirncvjfmdhv6samxvvlohfqx7jklfxoxj7xn3fh7qeabs3taemdsdqd.onion/
- http://noko65rmtaiqyt2cw2h4jrxe3u56t2k7ov3nd22hoji4c5vnfib2i4yd.onion
- http://noko65rmtaiqyt2cw2h4jrxe3u56t2k7ov3nd22hoji4c5vnfib2i4yd.onion/api/leaks/get
- http://nokoleakb76znymx443veg4n6fytx6spck6pc7nkr4dvfuygpub6jsid.onion
Source
Updated 3 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
