Inactive ransomware operator
← All groupsVanHelsing
8 victims indexed · first seen 1 year ago · last activity 1 year ago
At a glance
- Status
- inactive
- First seen
- 1 year ago
- Last activity
- 1 year ago
- Onion sites
- 4 known endpoints
- Primary sector
- Healthcare · 2 hits
About
References
2 linksExternal sources curated by the MISP threat-intel community.
Timeline
2 monthsTop countries
Top sectors
MITRE ATT&CK
3 techniques · 3 tacticsTactics
Recent victims
Loading…
Onion infrastructure
4 known- http://vanhelqmjstkvlhrjwzgjzpq422iku6wlggiz5y5r3rmfdeiaj3ljaid.onion
- http://vanhelvuuo4k3xsiq626zkqvp6kobc2abry5wowxqysibmqs5yjh4uqd.onion/blog
- http://vanhelwmbf2bwzw7gmseg36qqm4ekc5uuhqbsew4eihzcahyq7sukzad.onion/blog
- http://vanhelxjo52qr2ixcmtjayqqrcodkuh36n7uq7q7xj23ggotyr3y72yd.onion/blog
Source
Updated 1 year agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
