Inactive ransomware operator
← All groupsYanluowang
6 victims indexed · first seen 4 years ago · last activity 4 years ago
At a glance
- Status
- inactive
- First seen
- 4 years ago
- Last activity
- 4 years ago
- Onion sites
- 1 known endpoint
- Primary sector
- Media · 1 hits
About
References
7 linksExternal sources curated by the MISP threat-intel community.
- blog.talosintelligence.com/2022/08/recent-cyber-attack.html
- github.com/albertzsigovits/malware-notes/tree/master/Ransomware-Windows-Yanluowang
- securelist.com/how-to-recover-files-encrypted-by-yanlouwang/106332/
- symantec-enterprise-blogs.security.com/blogs/threat-intelligence/yanluowang-targeted-ransomware
- bleepingcomputer.com/news/security/free-decryptor-released-for-yanluowang-ransomware-victims/
- symantec.broadcom.com/hubfs/SED/SED_Threat_Hunter_Reports_Alerts/SED_FY22Q2_SES_Ransomware-Threat-Landscape_WP.pdf
- ransomlook.io/group/yanluowang
Timeline
2 monthsTop sectors
MITRE ATT&CK
4 techniques · 4 tacticsTactics
Recent victims
Loading…
Onion infrastructure
1 known- http://jukswsxbh3jsxuddvidrjdvwuohtsy4kxg2axbppiyclomt2qciyfoad.onion
Source
Updated 4 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
