Reading:
On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild

On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild

August 21, 2023

[Update] September 15, 2023: See the subheading: “Ransomed.vc Interview.”

[Update] September 4, 2023: The Ransomed team is collaborating with Everest Ransomware, read more under: “Old Ties, New Threats: Everest Echoes.”

[Update] August 24, 2023: Added subheadings: “Ransomed.vc Lists Three New Victims and Receives Payment for a Previous Attack,” “An Extortion Approach That Utilizes GDPR Fines.”

We have been monitoring Telegram for a long time as many of the threat actors and dark web activities are also actively running on Telegram. A Telegram group that we previously monitored as RansomForums had recently announced that they would be doing a project called Ransomed.vc.

The group’s owner has renamed his private chat room to Ransomed.vc Chat:

Figure. 1. First Message of Ransomed.vc Chat room
Figure. 1. First Message of Ransomed.vc Chat room
Figure 2. Welcome post of Ransomed.vc  (Source: FalconFeedsio)
Figure 2. Welcome post of Ransomed.vc  (Source: FalconFeedsio)

However, the site suffered a DDoS attack shortly after its launch and was dubbed BreachForums2 by the attackers:

Figure 3. Ransomed.vc’s screenshot after being attacked (Source: Karol Paciorek)
Figure 3. Ransomed.vc’s screenshot after being attacked (Source: Karol Paciorek)

Another Twitter user also discovered that RansomForums’ favicon icon looks the same as BreachForums’ favicon.

Figure 4. Favicons of RansomForums and BreachForums (Source: Crocodyli)
Figure 4. Favicons of RansomForums and BreachForums (Source: Crocodyli)

According to the group owner’s chat messages, the admin will not use the forum for a while until Breachforums is closed and he has the source code of RaidForums:

Figure 5. Telegram group owner’s statement
Figure 5. Telegram group owner’s statement

After this process, Ransomed.vc was transformed into a site sharing ransom victims: 

Figure 6. Main page of Ransomed.vc
Figure 6. Main page of Ransomed.vc

When we search the directories of the page domain, we see that they do not have any other subpages other than the ones they have shared at the moment:

Figure 7. Dirbuster output of ransomed.vc domain
Figure 7. Dirbuster output of Ransomed.vc domain

When we check the domain in VirusTotal, it appears clean, but in the relation graph, it is linked to an IP address tagged as malicious:

Figure 8. VirusTotal output and Relation graph of Ransomed.vc domain (Source:VirusTotal)
Figure 8. VirusTotal output and Relation graph of Ransomed.vc domain (Source:VirusTotal)

In addition, the group shares victim posts on its Telegram channel, which they actively use:

Figure 9. Telegram channel information of Ransomed.vc
Figure 9. Telegram channel information

First Victims of Ransomed.vc

Figure 10. A1 Data Provider has been compromised by Ransomed[.]vc
Figure 10. A1 Data Provider has been compromised by Ransomed.vc
Figure 11. A1 Data Provider’s screenshots of Ransomed.vc
Figure 11. A1 Data Provider’s screenshots of Ransomed.vc

I&G Broker House:

Figure 12. I&G Broker House
Figure 12. I&G Broker House
Figure 13. I&G Broker House’s screenshots of Ransomed.vc
Figure 13. I&G Broker House’s screenshots of Ransomed.vc

We also see that they are looking for new operators on their Telegram channels, which suggests that there may be more victim announcements in the near future.

Figure 14. Ransomed.vc Telegram posts about they are looking for new operators
Figure 14. Ransomed.vc Telegram posts about they are looking for new operators

Ransomed.vc Lists Three New Victims and Receives Payment for a Previous Attack

Based on the latest information, the Ransomed.vc group has targeted three new victims. One of these victims is Optimity, a provider of managed IT services. The threat actors assert that they have exported Optimity’s entire Azure Cloud, which granted them access to over a thousand companies. 

Figure 15. Optimity
Figure 15. Optimity

Another exported database belongs to Transunion. The ransom threat actors claimed that they successfully infiltrated the entire cloud, gaining possession of all materials used and downloaded by Transunion employees. One such dataset has also been obtained for a company named Jhooker. 

Figure 16. Transunion
Figure 16. Transunion
Figure 17. Jhooker
Figure 17. Jhooker

Furthermore, the ransomware operation has apparently received a payment following their attack on A1 Data Provider. However, only one out of four payments has been fulfilled. It appears that the ransom group accepts payments in installments, a departure from the norm among ransomware groups we have encountered so far. 

Figure 18. ¼ partial payments have been paid by A1 Data Provider.
Figure 18. ¼ partial payments have been paid by A1 Data Provider.

An Extortion Approach That Utilizes GDPR Fines

An additional revelation about the group has been shared in a tweet by vx-underground. The Ransomed.vc group seems to use an extortion strategy that leverages GDPR (Europe’s General Data Protection Laws). Essentially, the group coerces victims into either paying the ransom or facing GDPR fines upon the exposure of their data. This GDPR-based extortion scheme diverges from the typical extortion approaches, as these threat actors exploit protective laws to intimidate victims for financial gain.

Old Ties, New Threats: Everest Echoes

In a recent post by the Ransomed team, we noticed that they are collaborating with Everest Ransomware, as evident in the details of SKF.com‘s victim announcement. Upon reviewing Everest’s claim post, we observed Everest also made the same post. Everest is a threat actor that has been active since 2020. Everest has been involved in ransomware attacks, initial access brokering, and data extortion activities. Additionally, they have been active on platforms such as XSS Forum and Breached.

Fig. 19. Everest and Ransomed’s claim posts about SKF.com
Fig. 19. Everest and Ransomed’s claim posts about SKF.com

Considering that Ransomed was one of the founders of BlackForums after Breached and Everest was active in Breached, we can infer that their fellowship is not for a single operation but a history.

Ransomed.vc Interview

Daily Dark Web published an interview with Ransomed.vc on September 14th. The interview shows how a ransomware operator thinks and sheds light on many claims and points about Ransomed[.]vc. Some highlights from the interview are as follows:

Can you introduce your group and explain why you engage in ransomware attacks?

– Of course I can, we are a big team I have to say of 77 affiliates and a few more groups in partnership. We are financially motivated so this answers the second part of the question

  • More on the topic of their working scheme:

What are the primary motivations behind your attacks? Is it for financial gain, ideological reasons, or something else?

– Financial gain and sometimes political reason.

How do you choose your targets? Are you targeting large corporations, small businesses, or individual users?

– I require at least 5M in revenue so it is even worth to work on.

  • Their answers to some of the claims we included in this article were as follows:

In a recent post by the Ransomed team, they are collaborating with Everest Ransomware. Could you specify the nature of your connection with the Everest Group?

– Old friends dont forget their friends.

Alleged ties between Exposed Forum and Ransomed: Could you specify the nature of your connection with the Exposed Forum?

– I have seen the news yeah, idk what I can say about it, never been in their forum neither will I ever be.

Don’t forget to check out Daily Dark Web’s post for the full interview.

Discovering the Dark Web Landscape: SOCRadar XTI Monitoring and Threat Insights

Utilizing advanced monitoring techniques and AI-driven intelligence, SOCRadar XTI consistently surveils the entire web landscape, including the clear, dark, and deep web, alongside other hacker channels on platforms like Telegram. With its robust monitoring capabilities, SOCRadar provides an invaluable service by alerting organizations before compromise.

For a deeper understanding of the hidden facets of the internet and insights into threat actors operating from the depths of the dark web, and their malicious toolsets, explore our platform.

SOCRadar Dark Web Monitoring
Figure 20. SOCRadar Dark Web Monitoring

Furthermore, you can request a free dark web report here to learn the scope of your exposure to such threats and bolster your overall security posture.

Latest Posts