threatintel
actor tracker
All actors
MITRE ATT&CK technique

T1567.002

View the official technique description on attack.mitre.org

Tracked actors using this technique · 12

8Base

8base

Russian-speaking ransomware-as-a-service operation that emerged in 2022 as a Phobos affiliate, deploying a modified Phobos encryptor with double-extortion tactics. Targeted small and medium-sized bus…

RU · RussiaRansomwareHigh confidence
1 aliases4 TTPs1 event

Akira

akira

Ransomware-as-a-service operation active since March 2023, characterized by an unusually retro 1980s-terminal-styled leak site. CISA estimated $42M+ in extracted ransoms across 250+ organizations wit…

?? · UnknownRansomwareModerate confidence
1 aliases4 TTPs5 events

ALPHV/BlackCat

alphv-blackcat

Russian-speaking ransomware-as-a-service operation, first observed November 2021, notable as the first prominent ransomware family written in Rust. Operated the affiliate program responsible for the…

?? · UnknownRansomwareModerate confidence
3 aliases4 TTPs6 events

Cl0p

cl0p

Russian-speaking double-extortion crew historically aligned with TA505/FIN11. Specialized in mass exploitation of managed-file-transfer software zero-days: Accellion FTA (2020), GoAnywhere MFT (early…

?? · UnknownRansomwareModerate confidence
3 aliases4 TTPs1 event

DarkSide

darkside

Russian-speaking ransomware-as-a-service operation active from August 2020 to May 2021, when an affiliate's compromise of Colonial Pipeline triggered the fuel-supply crisis on the U.S. East Coast and…

RU · RussiaRansomwareModerate confidence
2 aliases4 TTPs1 event

Hive

hive

Russian-speaking ransomware-as-a-service operation active from mid-2021 through January 2023. Best known publicly for the May 2022 compromise of the Costa Rican government — which prompted Costa Rica…

?? · UnknownRansomwareModerate confidence
0 aliases4 TTPs2 events

INC Ransom

inc-ransom

Russian-speaking ransomware-as-a-service operation active since mid-2023, notable for sustained targeting of UK NHS trusts and U.S. healthcare providers. Major UK incidents: **NHS Dumfries and Gallow…

RU · RussiaRansomwareLow confidence
1 aliases4 TTPs2 events

LockBit

lockbit

Russian-speaking ransomware-as-a-service operation that by mid-2023 was the most prolific ransomware brand on public leak-site tracking by victim count. Disrupted in February 2024 by Operation Cronos…

RU · RussiaRansomwareHigh confidence
4 aliases4 TTPs1 event

Qilin

qilin

Russian-speaking ransomware-as-a-service operation tracked by vendors as Qilin (and earlier as Agenda). Best known publicly for the 3 June 2024 compromise of Synnovis — the pathology-services provide…

?? · UnknownRansomwareLow confidence
1 aliases4 TTPs2 events

RansomHub

ransomhub

Russian-speaking ransomware-as-a-service operation announced via RAMP forum on 2 February 2024 by a user 'koley', widely assessed as the primary destination for displaced ALPHV/BlackCat and LockBit a…

?? · UnknownRansomwareModerate confidence
2 aliases4 TTPs1 event

REvil

revil

Russian ransomware-as-a-service operation derived from GandCrab in April 2019. Conducted the 2021 Kaseya VSA supply-chain compromise (~1,500 downstream victims via 60 MSPs), the JBS Foods $11M ransom…

RU · RussiaRansomwareHigh confidence
3 aliases4 TTPs2 events

ShinyHunters

shinyhunters

Financially-motivated cybercrime collective active since April 2020, responsible for some of the largest data-theft and extortion incidents of the post-2020 era. Operationally blends credential-stuff…

?? · UnknowneCrimeHigh confidence
2 aliases4 TTPs3 events