Ransomware : by Group

[ For GroupLink (TOR), you need to change BAWANG with ONION, example: https://tegbmnhkbpqz637f2yd.bawang >> https://tegbmnhkbpqz637f2yd.onion ]
Country Discovered Published Group Name Victim Source Description
US2025-04-102025-04-07HELLCAT
Google | Research
POTOMAC FINANCIAL SERVICES
About Victim
Show Description
We have breached a U.S.-based financial services firm. 381GB of sensitive data has been secured. The name will be made public in a few hours. This is a warning.
2025-04-072025-04-07HELLCAT
Google | Research
P**O***
About Victim
Show Description
We have breached a U.S.-based financial services firm. 381GB of sensitive data has been secured. The name will be made public in a few hours. This is a warning.
CN2025-04-072025-04-07HELLCAT
Google | Research
CVTE
About Victim
Show Description
We have breached the internal systems of Guangzhou Shiyuan Electronic Technology, securing sensitive files that, if exposed, would cause serious disruption across operations and partnerships.
US2025-04-052025-03-18HELLCAT
Google | Research
HIGHWIRE PRESS
About Victim
Show Description
Jiraware <<3 !! We hold sensitive data from HighWire Press, a leading platform serving scholarly publishers. The data includes internal documents, communications, and materials that could impact both HighWire and its publishing partners.
US2025-04-052025-04-05HELLCAT
Google | Research
RACAMI
About Victim
Show Description
Jiraware <<3 !! We have breached Racami’s internal systems. The data in our possession poses a serious threat to their business continuity, reputation, and client trust.
PL2025-04-052025-04-05HELLCAT
Google | Research
ASSECO
About Victim
Show Description
Jiraware <<3 !! We have breached Asseco’s internal systems, stealing sensitive files, communications, financial records, and source material
SE2025-04-052025-04-05HELLCAT
Google | Research
LEOVEGAS AB
About Victim
Show Description
We have compromised the internal systems of LeoVegas AB. The data in our possession threatens their operations, regulatory compliance, and customer trust.
CN2025-03-292025-03-29HELLCAT
Google | Research
TRANSSION HOLDINGS
About Victim
Show Description
We hold almost 70GB of sensitive data from Transsion, a leading mobile device provider with $8.6B in revenue. This includes emails, internal communications, source codes, project planning, and data from Transsion and its partners.
ES2025-03-252025-03-24HELLCAT
Google | Research
GRUPO SANTILLANA
About Victim
Show Description
We hold sensitive files from Santillana, the largest business unit of Spain’s publicly traded Prisa media group. The company must act quickly to prevent the exposure of this data.
US2025-03-252025-03-24HELLCAT
Google | Research
OMNITRACS
About Victim
Show Description
We hold sensitive files from Omnitracs, a leading provider of fleet management and logistics solutions. The company must act swiftly to prevent the exposure of this data.
US2025-03-172025-03-17HELLCAT
Google | Research
ELECTRONICS FOR IMAGING
About Victim
Show Description
We hold 19GB of sensitive files from Electronics For Imaging, Inc., including critical corporate data that could jeopardize the company's operations, client relationships, and reputation if released publicly.
CH2025-03-162025-03-15HELLCAT
Google | Research
ASCOM HOLDING AG
About Victim
Show Description
44GB of sensitive data including internal reports, sales documents, confidential contracts, development tools, and source code stolen from Ascom.
DE2025-02-282025-02-25HELLCAT
Google | Research
ONEDEALER
About Victim
Show Description
We have obtained over 330,000 records from OneDealer partners, including sales reports, leads, customer data, and vehicle details with VINs and license plates. Affected companies include AutoHellas, AutoBesikos, KosmoCar, AWT, Karenta AE, QA, Proaxia, Hyundai, BMW, Audi, Kia,
TR2024-12-262024-12-26HELLCAT
Google | Research
CAR CARE PLAN - TURKEY
About Victim
Show Description
We have successfully stolen over50 GBof data from Car Care Plan, including financial records with sensitive information, legal documents and statements, customer records, along with internal documents and records. All the data has been encrypted, and without our decryption key, it is almost impossible to decrypt.To ensure the return of this data, we are demanding a ransom of0.5 BTC. The deadline for this payment is fast approaching. Once the payment is received, the decryption key will be provided, and the data will be returned without delay. It is up to Car Care Plan to act accordingly.
ID2024-12-252024-12-25HELLCAT
Google | Research
SISTEM INFORMASI PENGELOLAAN KEUANGAN DAERAH (SIPKD)
About Victim
Show Description
We have successfully stolen82 GBof data, including backups, from the e-Finance system of Blora Regency, known as theSistem Informasi Pengelolaan Keuangan Daerah (SIPKD). The data spans from 2018 to the present and remains in our possession. To ensure its safe return, we are demanding1.5 BTC. The deadline for this payment is fast approaching. Once the payment is received, the data will be returned without further delay. The terms are clear, and it is up to Blora Regency's authorities to act accordingly.
US2024-12-252024-12-25HELLCAT
Google | Research
PINGER - USA
About Victim
Show Description
We have successfully breached Pinger, obtaining 111 GB of sensitive data. This includes over 9 million user records, private messages, voice messages, internal tools such as phone number lookup and notification sender, backend systems, and source codes. Since the ransom was not paid, all the data has been publicly released.
TZ2024-11-042024-11-04HELLCAT
Google | Research
COLLEGE OF BUSINESS - TANZANIA
About Victim
Show Description
We have released over 500,000 records from Tanzania’s College of Business Education, containing student names, phone numbers, emails, and additional data, including possible billing information.
JO2024-11-042024-11-04HELLCAT
Google | Research
MINISTRY OF EDUCATION - JORDAN
About Victim
Show Description
We have successfully accessed and compromised a range of sensitive documents from Jordan's Ministry of Education. This includes images of identification cards, divorce papers, and various letters addressed to the Minister.
FR2024-11-042024-11-04HELLCAT
Google | Research
SCHNEIDER ELECTRIC - FRANCE
About Victim
Show Description
[IA generated] Schneider Electric, based in France, is a global leader in energy management and automation. The company focuses on digital transformation by integrating world-leading process and energy technologies. It provides solutions for homes, buildings, data centers, infrastructure, and industries, enhancing efficiency and sustainability. Schneider Electric emphasizes innovation and sustainability in its offerings.
IL2024-10-252024-10-25HELLCAT
Google | Research
THE KNESSET - ISRAEL
About Victim
Show Description
We have successfully compromised the Knesset's secure networks and extracted 64GB of sensitive data. This includes internal communications and confidential documents.