Inactive ransomware operator
← All groupsPay2Key
7 victims indexed · first seen 5 years ago · last activity 5 years ago
At a glance
- Status
- inactive
- First seen
- 5 years ago
- Last activity
- 5 years ago
- Onion sites
- 2 known endpoints
- Primary sector
- Information Technology · 1 hits
About
References
11 linksExternal sources curated by the MISP threat-intel community.
- research.checkpoint.com/2020/ransomware-alert-pay2key
- twitter.com/p2ktwtacc
- keybase.io/pay2key
- docs.google.com/spreadsheets/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3
- go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf
- research.checkpoint.com/2020/ransomware-alert-pay2key/
- twitter.com/TrendMicroRSRCH/status/1389422784808378370
- bleepingcomputer.com/news/security/intels-habana-labs-hacked-by-pay2key-ransomware-data-stolen/
- clearskysec.com/wp-content/uploads/2020/12/Pay2Kitten.pdf
- pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf
- ransomlook.io/group/pay2key
Timeline
2 monthsTop countries
Top sectors
MITRE ATT&CK
4 techniques · 4 tacticsTactics
Recent victims
Loading…
Onion infrastructure
2 known- http://pay2key2zkg7arp3kv3cuugdaqwuesifnbofun4j6yjdw5ry7zw2asid.onion
- http://pay2key2zkg7arp3kv3cuugdaqwuesifnbofun4j6yjdw5ry7zw2asid.onion/
Source
Updated 5 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
