R
Ransomwhere.org
Live MapLatest VictimsGroups
PaymentsTTPsIdentifyNewsDataAPI
LIVE
Ransomwhere.org

Real-time ransomware intelligence platform. Tracking threat actors, victims, and payments to raise awareness and help defend against ransomware attacks worldwide.

Platform

  • Live Map
  • Latest Victims
  • Groups
  • Payments
  • Identify
  • News

Resources

  • Data & Methodology
  • API Docs
  • NoMoreRansom
  • Ransomware.live
  • CISA Advisories

Data sourced from Ransomware.live API. For informational purposes only.

© 2026 Ransomwhere.org

Groups/ransomhub

ransomhub

Inactive

The group emerged in mid-February 2024 and has already listed several organizations as alleged victims of their attacks, resulting from extortion through encryption and data leaks.<br> <br> The announcement of the sale of the new Ransomware-as-a-Service (RaaS) by RansomHub was published on one of the Russian-origin forums used by cybercrime to advertise malicious services, known as RAMP4U (or RAMP). A user with the nickname and persona of 'koley' announced the affiliate program on February 2, 2024.<br> <br> In the new RaaS announcement, it was mentioned that the money laundering operation of the paid ransoms is the responsibility of the affiliate. This means that all communication and sending of the decryptor to the victim are done through chat. The split of this RaaS would be 90% of the value for the affiliate and 10% for the developer, who in this case would be the persona of Koley.<br> <br> Furthermore, according to the publication, the ransomware payload is written in Golang language, uses the asymmetric algorithm based on x25519, and encryption algorithms AES256, ChaCha20, and xChaCha20, standing out for its speed. The encryption is obfuscated using AST.<br> <br> The payload would support network propagation and encryption of data both in secure and local mode. According to Koley, the ransomware is designed to operate on platforms such as Windows, Linux, and ESXi, as well as other architectures such as ARM and MIPS.<br> <br> As pointed out by the panel and already highlighted by the intelligence team, Koley stated that the panel uses a .onion domain, allowing the affiliate to organize and manage targets and chat rooms, view access logs, automatically respond when offline, and create private blog pages.<BR>Source: https://github.com/crocodyli/ThreatActors-TTPs

844
Victims
3
Sites

Known Leak Sites

ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onionDLS
ransomgxjnwmu5ceqwo2jrjssxpoicolmgismfpnslaixg3pgpe5qcad.onionFiles
fpwwt67hm3mkt6hdavkfyqi42oo3vkaggvjj4kxdr2ivsbzyka5yr2qd.onionFiles

Victims (844)

Live
intellioan.com
ransomhubUS
jackpotjunction.com
ransomhubUS
europtec.com
ransomhubDE
delta-life.com
ransomhubDE
www.assisi.nl
ransomhubNL
phaus.us&phakr.com&phabodysystems.com
ransomhubUS
www.bassi.it
ransomhubIT
www.allmilmoe.com
ransomhubDE
brattenelectrictn.com
ransomhub
www.hongthongrice.com
ransomhubTH
www.fkm-elemente.de
ransomhubDE
conterra.com
ransomhubDE
www.DSelectrical.com
ransomhub
www.carolinaac.com
ransomhubUS
www.garbinc.com
ransomhubUS
www.mododoc.com
ransomhubUS
www.argentosc.com
ransomhubAR
www.ripplejunction.com
ransomhubUS
www.creativelogisticservices.com
ransomhub
www.afnigc.ca
ransomhubCA
www.cormidom.com.do
ransomhubDO
www.lions-online.org
ransomhubDE
www.solidworld.it
ransomhubIT
www.s3s.com
ransomhub
www.rivaldt.com
ransomhubBR

Top Targeted Countries

United States321
Unknown90
Brazil35
Canada34
United Kingdom32

Profile

:
:
:
:
:
:
:

Activity

Total victims844
Countries affected74
Last seen