Inactive ransomware operator
← All groupssilent
6 victims indexed · first seen 1 year ago · last activity 11 months ago
At a glance
- Status
- inactive
- First seen
- 1 year ago
- Last activity
- 11 months ago
- Onion sites
- 1 known endpoint
- Primary sector
- Not Found · 2 hits
About
References
1 linkExternal sources curated by the MISP threat-intel community.
Timeline
3 monthsTop countries
Top sectors
MITRE ATT&CK
12 techniques · 8 tacticsTactics
Techniques
- T1005Data from Local System
- T1027.003Steganography
- T1049System Network Connections Discovery
- T1057Process Discovery
- T1105Ingress Tool Transfer
- T1189Drive-by Compromise
- T1203Exploitation for Client Execution
- T1204.002Malicious File
- T1566.001Spearphishing Attachment
- T1588.001Malware
- T1590.005IP Addresses
- T1592.002Software
Recent victims
Loading…
Onion infrastructure
1 known- http://silentbgdghp3zeldwpumnwabglreql7jcffhx5vqkvtf2lshc4n5zid.onion
Source
Updated 11 months agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
