Ransomware victim disclosure
← All victimsRANSOMEDVC is for sale
Claimed by ransomed · listed 3 years ago
Status timeline
- Listed
Oct 30, 2023
- Data leaked
At a glance
- Group
- ransomed
- Status
- Data leaked
- Sector
- Technology
- Listed on leak site
- Oct 30, 2023
About the victim
AI dossier — public-source company profileRANSOMEDVC (also known as Ransomed.vc) is a ransomware operator group, not a legitimate company. The entity operated a ransomware-as-a-service platform and leak site, claiming responsibility for multiple attacks. The listing represents the operator's attempt to sell the entire criminal enterprise, including infrastructure and tooling.
- Industry
- Cybercrime / Ransomware-as-a-Service
Attack summary
Severity: low — No actual victim company or its data is disclosed here; this is a threat-actor self-listing/sale announcement with no verifiable victim PII, business data, or operational disruption to a specific target. The post concerns the criminal group itself, not an attack on an identifiable organisation.This post is not a victim disclosure but rather the ransomware operator RANSOMEDVC advertising the sale of their own criminal operation, citing unwanted federal law enforcement attention as the reason for exit. The package offered includes domains, a ransomware builder described as fully undetected, and associated infrastructure.
Data the group says was taken
AI dossier — extracted from the leak post- Ransomware builder (FUD)
- Operator domains
- LAN auto-propagation tooling
- Privilege escalation tools
- Existing victim data/access (implied)
What the group claims
I do not want to continue being monitored by federal agencies and i would wish to sell the project to someone who will want to continue it. We are selling everything. IN PACKAGE: Domains 1 Ransomware Builder = 100% FUD – Bypassing all AV’s and automatically infecting all LAN device’s inside network.. – automatically escalate…
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
