Inactive ransomware operator
← All groupssamas
aka Samas-Samsam, samsam.exe, MIKOPONI.exe, RikiRafael.exe, showmehowto.exe, SamSam Ransomware, SamSam · 1 victims indexed · first seen 8 years ago · last activity 8 years ago
At a glance
- Status
- inactive
- Aliases
- Samas-Samsam, samsam.exe, MIKOPONI.exe, RikiRafael.exe, showmehowto.exe, SamSam Ransomware, SamSam
- First seen
- 8 years ago
- Last activity
- 8 years ago
- Primary sector
- Government Facilities · 1 hits
About
References
8 linksExternal sources curated by the MISP threat-intel community.
- download.bleepingcomputer.com/demonslay335/SamSamStringDecrypter.zip
- blog.talosintel.com/2016/03/samsam-ransomware.html
- intelsecurity.com/advanced-threat-research/content/Analysis_SamSa_Ransomware.pdf
- bleepingcomputer.com/news/security/new-samsam-variant-requires-special-password-before-infection/
- bleepingcomputer.com/news/security/samsam-ransomware-crew-made-nearly-6-million-from-ransom-payments/
- sophos.com/en-us/medialibrary/PDFs/technical-papers/SamSam-The-Almost-Six-Million-Dollar-Ransomware.pdf
- id-ransomware.blogspot.com/2016/03/samsam.html
- ransomlook.io/group/samsam
Timeline
1 monthsTop countries
Top sectors
MITRE ATT&CK
3 techniques · 3 tacticsTactics
Recent victims
Loading…
Source
Updated 8 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
