H-ISAC TLP Green Ransomware Data Leak Sites Report November 4, 2021

A valued colleague is providing this daily ransomware tracker as TLP:GREEN  for purposes of increasing ransomware threat awareness. The body of the email contains newly added victims since the last update.

The information provided in the report is pulled from threat actor data leak sites ‘as is,’ meaning, it is shared as it has been posted by the threat group. They have been known to make mistakes, have typos, mis-name victims, or use other language aside from the victim name. The report shares the information ‘as is’ and neither the source of the report, nor our team, goes to the individual sites to verify the information, though it can be (and we sometimes do) cross referenced with other reporting sources. Neither the originator of the report, nor our team, is in direct discussion w/ the threat actors. There are cyber threat intelligence firms that do engage in cybercrime 

forums and can provide additional perspective of victims and ongoing discussions occurring in those forums.

We share the report for recipient awareness. Often times, a victim may be a supplier or have another third or fourth party relationship with recipients. We hope that recipients look for those relationships and then are able to inquire directly as may be appropriate with the supposed victim.

By the time a victim is identified in the name and shame report, it is reasonable to assume they have been contacted by the threat group and have either elected not to make payment or that some other issue has led the group to disclose the victim publicly. Victims that pay do not usually have their data made available publicly. We have not seen a significant amount of incidents that were deliberately falsely reported by threat groups, though, as noted above, they have made mistakes.

Please be advised the .txt and .csv attachments that typically accompany this report will no longer be provided per collection source

New victims listed:

::: CL0P :::

===========================

Victim / Company Name    Date First Seen by Tracker

-----------------------  --------------------------------

ENESCO[.]COM             2021-11-03 22:05:02.432141+00:00

::: CUBA :::

===========================

Victim / Company Name           Date First Seen by Tracker

------------------------------  --------------------------------

first-coast-logistics-services  2021-11-03 13:05:02.443304+00:00

::: CoomingProject :::

===========================

Victim / Company Name                                                Date First Seen by Tracker

-------------------------------------------------------------------  --------------------------------

Websites[.]co[.]in - Instant Website Builder | Create Your Free [.]  2021-11-03 11:05:02.477609+00:00

::: Grief :::

===========================

Victim / Company Name    Date First Seen by Tracker

-----------------------  --------------------------------

The Npd Group Inc        2021-11-03 12:05:03.008936+00:00

::: LockBit 2.0 :::

===========================

Victim / Company Name         Date First Seen by Tracker

----------------------------  --------------------------------

comune[.]gonzaga[.][.][.][.]  2021-11-03 12:35:02.376008+00:00

::: Midas :::

===========================

Victim / Company Name    Date First Seen by Tracker

-----------------------  --------------------------------

Company                  2021-11-03 18:35:02.351107+00:00

Download the report below. 

For help with Cybersecurity and Risk Advisory Services exclusively for AHA members, contact:

John Riggi

Senior Advisor for Cybersecurity and Risk, AHA

jriggi@aha.org

(O) +1 202 626 2272