Ransomware victim disclosure
← All victimsRANSOMEDVC is for sale
Claimed by Ransomedvc · listed 3 years ago
Status timeline
- Listed
Oct 30, 2023
- Data leaked
At a glance
- Group
- Ransomedvc
- Status
- Data leaked
- Sector
- Retail & Consumer
- Listed on leak site
- Oct 30, 2023
About the victim
AI dossier — public-source company profileThis record does not represent a legitimate company victim. The leak post is an advertisement by the RansomedVC ransomware operator announcing the sale of their entire criminal operation, including ransomware builder, domains, and associated infrastructure, citing a desire to exit due to federal agency monitoring.
Attack summary
Severity: low — No victim company, no exfiltrated data, and no operational attack are described. This is solely an exit/sale announcement by the threat actor group itself with no disclosed victim impact.No attack on a third-party company is described. The post is a self-listing by RansomedVC offering their ransomware-as-a-service toolkit and associated assets for sale to prospective buyers.
Data the group says was taken
AI dossier — extracted from the leak post- Ransomware builder (claimed 100% FUD)
- Operational domains
- LAN auto-propagation tooling
- Privilege escalation tooling
What the group claims
I do not want to continue being monitored by federal agencies and i would wish to sell the project to someone who will want to continue it. We are selling everything. IN PACKAGE: Domains 1 Ransomware Builder = 100% FUD – Bypassing all AV’s and automatically infecting all LAN device’s inside network.. – automatically escalate…
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
