Inactive ransomware operator
← All groupsRansomexx
aka Ransom X, Defray777, Defray-777, Defray 2018 · 85 victims indexed · first seen 6 years ago · last activity 1 month ago
At a glance
- Status
- inactive
- Aliases
- Ransom X, Defray777, Defray-777, Defray 2018
- First seen
- 6 years ago
- Last activity
- 1 month ago
- Onion sites
- 2 known endpoints
- Primary sector
- Technology · 4 hits
About
References
38 linksExternal sources curated by the MISP threat-intel community.
- malpedia.caad.fkie.fraunhofer.de/details/win.ransomexx
- id-ransomware.blogspot.com/2020/06/ransomexx-ransomware.html
- github.com/Bleeping/Ransom.exx
- bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/
- bleepingcomputer.com/news/security/brazils-court-system-under-massive-ransomexx-ransomware-attack/
- unit42.paloaltonetworks.com/vatet-pyxie-defray777/4/
- securelist.com/ransomexx-trojan-attacks-linux-systems/99279/
- bleepingcomputer.com/news/security/computer-hardware-giant-gigabyte-hit-by-ransomexx-ransomware
- cybereason.com/blog/cybereason-vs.-ransomexx-ransomware
- infosecurity-magazine.com/news/aerospace-giant-embraer-hit
- blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html
- cisoclub.ru/doc/otchet-kompanii-group-ib-ransomware-uncovered-2020-2021/?bp-attachment=group-ib_ransomware_uncovered_2020-2021.pdf
- docs.google.com/spreadsheets/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3
- go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf
- gustavopalazolo.medium.com/ransomexx-an%C3%A1lise-do-ransomware-utilizado-no-ataque-ao-stj-918001ec8195
- krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/
- web.archive.org/web/20210305181115/https://cisoclub.ru/doc/otchet-kompanii-group-ib-ransomware-uncovered-2020-2021/?bp-attachment=group-ib_ransomware_uncovered_2020-2021.pdf
- bleepingcomputer.com/news/security/ecuadors-state-run-cnt-telco-hit-by-ransomexx-ransomware/
- crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/
- crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/?utm_campaign=blog&utm_medium=soc&utm_source=twtr&utm_content=sprout
Timeline
24 monthsTop countries
Top sectors
MITRE ATT&CK
10 techniques · 7 tacticsTactics
Techniques
Recent victims
Loading…
Onion infrastructure
2 known- http://rnsm777cdsjrsdlbs4v5qoeppu3px6sb2igmh53jzrx7ipcrbjz5b2ad.onion
- http://rnsm777cdsjrsdlbs4v5qoeppu3px6sb2igmh53jzrx7ipcrbjz5b2ad.onion/
Source
Updated 1 month agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
