Ransomware

Starting last year, ransomware operators have escalated their extortion strategies by stealing files from victims before encrypting their data. These stolen files are then used as further leverage to force victims to pay.

Many ransomware operators have created data leak sites to publicly shame their victims and publish the files they stole.

As this is now a standard tactic for ransomware, all attacks must be treated as a data breaches.

Below is a list of ransomware operations that have create dedicated data leak sites to publish data stolen from their victims.

The list of ransomware data leak sites

AKO Ransomware (Rebranded as Ranzy below)

AKO ransomware began operating in January 2020 when they started to target corporate networks with exposed remote desktop services.

Unlike other ransomware, Ako requires larger companies with more valuable information to pay a ransom and an additional extortion demand to delete stolen data.

If payment is not made, the victim's data is published on their "Data Leak Blog" data leak site.

AKO data leak site
AKO data leak site

Avaddon Ransomware

Avaddon ransomware began operating in June 2020 when they launched in a spam campaign targeting users worldwide.

If payment is not made, the victim's data is published on their "Avaddon Info" site.

Avaddon ransomware data leak site
Avaddon ransomware data leak site

Babyk Ransomware

Babuk Locker is a new ransomware operation that launched at the beginning of 2021 and has since amassed a small list of victims worldwide.

Babyk Ransomware data leak site
Babyk Ransomware data leak site

CL0P Ransomware

CL0P started as a CryptoMix variant and soon became the ransomware of choice for an APT group known as TA505.

This group's ransomware activities gained media attention after encrypting 267 servers at  Maastricht University.

In March 2020, CL0P released a data leak site called 'CL0P^-LEAKS', where they publish the victim's data.

CL0P data leak site
CL0P data leak site

Conti Ransomware

Conti Ransomware is the successor of the notorious Ryuk Ransomware and it now being distributed by the TrickBot trojan.

This ransomware started operating in Jutne 2020 and is distributed after a network is compromised by the TrickBot trojan.

Operated as a private Ransomware-as-a-Service (RaaS), Conti released a data leak site with twenty-six victims on August 25, 2020.

Conti data leak site
Conti data leak site

Cuba Ransomware

Cuba ransomware launched in December 2020 and utilizes the .cuba extension for encrypted files.

Cuba Ransomware data leak site
Cuba Ransomware data leak site

DarkSide Ransomware

DarkSide is a new human-operated ransomware that started operation in August 2020.

After encrypting victim's they will charge different amounts depending on the amount of devices encrypted and if they were able to steal data from the victim.

BleepingComputer has seen ransom demands as low as $200,000 for victims who did not have data stolen to a high of $2,000,000 for victim whose data was stolen.

DarkSide data leak site
DarkSide data leak site

DoppelPaymer Ransomware

In July 2019, a new ransomware appeared that looked and acted just like another ransomware called BitPaymer.

Named DoppelPaymer by Crowdstrike researchers, it is thought that a member of the BitPaymer group split off and created this ransomware as a new operation.

Soon after CrowdStrike's researchers published their report, the ransomware operators adopted the given name and began using it on their Tor payment site.

DoppelPaymer targets its victims through remote desktop hacks and access given by the Dridex trojan.

High profile victims of DoppelPaymer include Bretagne Télécom and the City of Torrance in Los Angeles county.

In February 2020, DoppelPaymer launched a dedicated leak site that they call "Dopple Leaks" and have threatened to sell data on the dark web if a victim does not pay.

DoppelPaymer data leak site
DoppelPaymer data leak site

Egregor Ransomware

Egregor began operating in the middle of September, just as Maze started shutting down their operation. 

BleepingComputer was told that Maze affiliates moved to the Egregor operation, which coincides with an increased activity by the ransomware group.

For a new ransomware, it has been involved in some fairly large attacks that targeted Crytek, Ubisoft, and Barnes and Noble.

Egregor data leak site
Egregor data leak site

Everest (Everbe) ransomware

The Everest Ransomware is a rebranded operation previously known as Everbe. This group predominantly targets victims in Canada.

Everest ransomware data leak site
Everest ransomware data leak site

LockBit Ransomware

Started in September 2019, LockBit is a Ransomware-as-a-Service (RaaS) where the developers are in charge of the payment site and development and 'affiliates' sign up to distribute the ransomware.

Originally part of the Maze Ransomware cartel, LockBit was publishing the data of their stolen victims on Maze's data leak site.

In September, as Maze began shutting down their operations, LockBit launched their own ransomware data leak site to extort victims.

LockBit ransomware data leak site
LockBit ransomware data leak site

Maze Ransomware

Maze ransomware is single-handedly to blame for the new tactic of stealing files and using them as leverage to get a victim to pay.

First spotted in May 2019, Maze quickly escalated their attacks through exploit kits, spam, and network breaches.

In November 2019, Maze published the stolen data of Allied Universal for not paying the ransom.

Since then, they started publishing the data for numerous victims through posts on hacker forums and eventually a dedicated leak site. Soon after, all the other ransomware operators began using the same tactic to extort their victims.

Maze shut down their ransomware operation in November 2020.

Maze is responsible for numerous high profile attacks, including ones against cyber insurer Chubb, the City of PensacolaBouygues Construction, and Banco BCR.

Maze ransomware data leak site
Maze data leak site

MountLocker

Starting in July 2020, the Mount Locker ransomware operation became active as they started to breach corporate networks and deploy their ransomware. From ransom notes seen by BleepingComputer, the Mount Locker gang is demanding multi-million dollar ransom payments in some cases.

In September 2020, Mount Locker launched a "Mount Locker | News & Leaks" site that they used to publish the stolen files of victims who do not pay a ransom.

Mount Locker ransomware data leak site
Mount Locker ransomware data leak site

Nemty Ransomware

Originally launched in January 2019 as a Ransomware-as-a-Service (RaaS) called JSWorm, the ransomware rebranded as Nemty in August 2019.

As affiliates distribute this ransomware, it also uses a wide range of attacks, including exploit kits, spam, RDP hacks, and trojans.

In March, Nemty created a data leak site to publish the victim's data. This site is not accessible at this time.

Nemty leak site
Nemty leak site

Nephilim Ransomware

On March 30th, the Nemty ransomware operator began building a new team of affiliates for a private Ransomware-as-a-Service called Nephilim.

Unlike Nemty, a free-for-all RaaS that allowed anyone to join, Nephilim was built from the ground up by recruiting only experienced malware distributors and hackers.

Soon after, they created a site called 'Corporate Leaks' that they use to publish the stolen data of victims who refuse to pay a ransom.

Nephilim data leak site
Nephilim data leak site

Netwalker Ransomware

Starting as the Mailto ransomware in October 2019, the ransomware rebranded as Netwalker in February 2020.

Best known for its attack against the Australian transportation company Toll Group, Netwalker targets corporate networks through remote desktop hacks and spam.

In May 2020, Newalker started to recruit affiliates with the lure of huge payouts and an auto-publishing data leak site that uses a countdown to try and scare victims into paying.

Law enforcement seized the Netwalker data leak and payment sites in January 2021.

Netwalker data leak site
Netwalker data leak site

Pay2Key ransomware

Pay2Key is a new ransomware operation that launched in November 2020 that predominantly targets Israeli organizations.

It is not believed that this ransomware gang is performing the attacks to create chaos for Israel businesses and interests.

Pay2Key data leak site
Pay2Key data leak site

Pysa Ransomware (Mespinoza)

Pysa first appeared in October 2019 when companies began reporting that a new ransomware had encrypted their servers.

When first starting, the ransomware used the .locked extension for encrypted files and switched to the .pysa extension in November 2019. 

With ransom notes starting with "Hi Company" and victims reporting remote desktop hacks, this ransomware targets corporate networks.

For those interesting in reading more about this ransomware, CERT-FR has a great report on their TTPs.

The ransomware operators have created a data leak site called 'Pysa Homepage' where they publish the stolen files of their "partners" if a ransom is not paid.

Pysa / Mespinoza data leak site

Ragnar Locker Ransomware

First seen in February 2020, Ragnar Locker was the first to heavily target and terminate processes used by Managed Service Providers (MSP).

This tactic showed that they were targeting corporate networks and terminating these processes to evade detection by an MSP and make it harder for an ongoing attack to be stopped.

Ragnar Locker gained media attention after encrypting the Portuguese energy giant Energias de Portugal (EDP) and asked for a 1,580 BTC ransom.

RagnarLocker has created a web site called 'Ragnar Leaks News' where they publish the stolen data of victims who do  not pay a ransom.

Ragnar Locker data leak site
Ragnar Locker data leak site

RansomExx/Defray 777

RansomExx ransomware is a rebranded version of the Defray777 ransomware and has seen increased activity since June 2020.

Some of their victims include Texas Department of Transportation (TxDOT), Konica Minolta, IPG Photonics, Tyler Technologies, and SoftServe.

RansomExx/Defray777 data leak site
RansomExx/Defray777 data leak site

Ranzy Locker

ThunderX is a ransomware operation that was launched at the end of August 2020. Soon after launching, weaknesses were found in the ransomware that allowed a free decryptor to be released.

The ransomware operators quickly fixed their bugs and released a new version of the ransomware under the name Ranzy Locker.

In October, the ransomware operation released a data leak site called "Ranzy Leak," which was strangely using the same Tor onion URL as the AKO Ransomware. 

The AKO ransomware gang told BleepingComputer that ThunderX was a development version of their ransomware and that AKO rebranded as Razy Locker.

Ranzy Locker ransomware data leak site
Ranzy Locker ransomware data leak site

REvil / Sodinokibi Ransomware

Sodinokibi burst into operation in April 2019 and is believed to be the successor of GandCrab, who shut down their ransomware operation in 2019.

Also known as REvil, Sodinokibi has been a scourge on corporate networks after recruiting an all-star team of affiliates who focus on high-level attacks utilizing exploits, hacked MSPs, and spam.

Known victims of the REvil ransomware include Grubman Shire Meiselas & Sacks (GSMLaw), SeaChange, Travelex, Kenneth Cole, and GEDIA Automotive Group.

After Maze began publishing stolen files, Sodinokibi followed suit by first publishing stolen data on a hacker forum and then launching a dedicated "Happy Blog" data leak site

REvil / Sodinokibi Ransomware data leak site
REvil / Sodinokibi data leak site

Sekhmet Ransomware

Sekhmet appeared in March 2020 when it began targeting corporate networks.

"Your company network has been hacked and breached. We downloaded confidential and private data. In case of not contacting us in 3 business days this data will be published on a special website available for public view," states Sekhmet's ransom note.

The Sekhmet operators have created a web site titled 'Leaks leaks and leaks' where they publish data stolen from their victims.

Sekhmet data leak site
Sekhmet data leak site

Snatch Ransomware

In operation since the end of 2018, Snatch was one of the first ransomware infections to steal data and threaten to publish it.

They previously had a leak site created at multiple TOR addresses, but they have since been shut down. It is not known if they are continuing to steal data.

Snatch leak site
Snatch ransom note 
(Source: Zerofox)

SunCrypt

SunCrypt is a ransomware that has been operating since the end of 2019, but have recently become more active after joining the 'Maze Cartel.'

SunCrypt launched a data leak site in August 2020, where they publish the stolen data for victims who do not pay a ransom.

SunCrypt data leak site
SunCrypt data leak site

Ransomware who leak data without dedicated sites

Instead of creating dedicated "leak" sites, the ransomware operations below leak stolen files on hacker forums or by sending emails to the media.

CryLock Ransomware

Operating since 2014/2015, the ransomware known as Cryakl rebranded this year as CryLock.

As part of the rebrand, they also began stealing data from companies before encrypting their files and leaking them if not paid.

CryLock lock screen
CryLock lock screen

ProLock Ransomware

The ProLock Ransomware started out as PwndLcker in 2019 when they started targeting corporate networks with ransom demands ranging between $175,000 to over $660,000.

After a weakness allowed a decryptor to be made, the ransomware operators fixed the bug and rebranded as the ProLock ransomware.

ProLock ransom note
ProLock ransom note

Snake Ransomware

Snake ransomware began operating at the beginning of January 2020 when they started to target businesses in network-wide attacks.

Most recently, Snake released the patient data for the French hospital operator Fresenius Medical Care.

Snake Ransomware ransom note
Snake ransom note

This list will be updated as other ransomware infections begin to leak data.

Related Articles:

Accenture confirms data breach after August ransomware attack

FBI seized $2.3M from affiliate of REvil, Gandcrab ransomware gangs

Yanluowang ransomware operation matures with experienced affiliates

Marine services provider Swire Pacific Offshore hit by ransomware

Magniber ransomware gang now exploits Internet Explorer flaws in attacks