Ransomware : by Group

[ For GroupLink (TOR), you need to change BAWANG with ONION, example: https://tegbmnhkbpqz637f2yd.bawang >> https://tegbmnhkbpqz637f2yd.onion ]
Country Discovered Published Group Name Victim Source Description
TR2024-12-262024-12-26HELLCAT
Google | Research
CAR CARE PLAN - TURKEY
About Victim
Show Description
We have successfully stolen over50 GBof data from Car Care Plan, including financial records with sensitive information, legal documents and statements, customer records, along with internal documents and records. All the data has been encrypted, and without our decryption key, it is almost impossible to decrypt.To ensure the return of this data, we are demanding a ransom of0.5 BTC. The deadline for this payment is fast approaching. Once the payment is received, the decryption key will be provided, and the data will be returned without delay. It is up to Car Care Plan to act accordingly.
ID2024-12-252024-12-25HELLCAT
Google | Research
SISTEM INFORMASI PENGELOLAAN KEUANGAN DAERAH (SIPKD)
About Victim
Show Description
We have successfully stolen82 GBof data, including backups, from the e-Finance system of Blora Regency, known as theSistem Informasi Pengelolaan Keuangan Daerah (SIPKD). The data spans from 2018 to the present and remains in our possession. To ensure its safe return, we are demanding1.5 BTC. The deadline for this payment is fast approaching. Once the payment is received, the data will be returned without further delay. The terms are clear, and it is up to Blora Regency's authorities to act accordingly.
US2024-12-252024-12-25HELLCAT
Google | Research
PINGER - USA
About Victim
Show Description
We have successfully breached Pinger, obtaining 111 GB of sensitive data. This includes over 9 million user records, private messages, voice messages, internal tools such as phone number lookup and notification sender, backend systems, and source codes. Since the ransom was not paid, all the data has been publicly released.
TZ2024-11-042024-11-04HELLCAT
Google | Research
COLLEGE OF BUSINESS - TANZANIA
About Victim
Show Description
We have released over 500,000 records from Tanzania’s College of Business Education, containing student names, phone numbers, emails, and additional data, including possible billing information.
JO2024-11-042024-11-04HELLCAT
Google | Research
MINISTRY OF EDUCATION - JORDAN
About Victim
Show Description
We have successfully accessed and compromised a range of sensitive documents from Jordan's Ministry of Education. This includes images of identification cards, divorce papers, and various letters addressed to the Minister.
FR2024-11-042024-11-04HELLCAT
Google | Research
SCHNEIDER ELECTRIC - FRANCE
About Victim
Show Description
[IA generated] Schneider Electric, based in France, is a global leader in energy management and automation. The company focuses on digital transformation by integrating world-leading process and energy technologies. It provides solutions for homes, buildings, data centers, infrastructure, and industries, enhancing efficiency and sustainability. Schneider Electric emphasizes innovation and sustainability in its offerings.
IL2024-10-252024-10-25HELLCAT
Google | Research
THE KNESSET - ISRAEL
About Victim
Show Description
We have successfully compromised the Knesset's secure networks and extracted 64GB of sensitive data. This includes internal communications and confidential documents.