Active ransomware operator
← All groupstitan
7 victims indexed · first seen 2 days ago · last activity 2 days ago
At a glance
- Status
- active
- First seen
- 2 days ago
- Last activity
- 2 days ago
- Onion sites
- 1 known endpoint
- Primary sector
- Business Services · 4 hits
About
Timeline
1 monthsTop countries
Top sectors
MITRE ATT&CK
17 techniques · 8 tacticsTactics
Techniques
- T1190Exploit Public-Facing Application
- T1133External Remote Services
- T1059Command and Scripting Interpreter
- T1047Windows Management Instrumentation
- T1053Scheduled Task/Job
- T1112Modify Registry
- T1562.001Disable or Modify Tools
- T1070.004File Deletion
- T1083File and Directory Discovery
- T1082System Information Discovery
- T1135Network Share Discovery
- T1057Process Discovery
- T1074.001Local Data Staging
- T1041Exfiltration Over C2 Channel
- T1486Data Encrypted for Impact
- T1490Inhibit System Recovery
- T1489Service Stop
Recent victims
Loading…
Onion infrastructure
1 known- http://x4bccxlsmjsxlnnf3ocvndlshgfkagzytpqmsjnlfykceumnw6i4hkqd.onion
Source
Updated 2 days agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
