๐๏ธ NEWS
SCANNING INTELLIGENCE DATABASES...
๐ฆ EAGLE EYE
Operation Theater
Select a province from the map or selector. Camera feed remains locked until theater is chosen.
Live Tactical Viewer
Select operation theater first to activate monitoring.
Sensor Roster
๐ต๏ธโโ๏ธ RANSOM TRACK
Total Victims
---
Active Groups
---
Press Articles
---
IOC & YARA
---
๐ Top Ransomware Groups
๐ Attack Timeline
๐ญ Target Sectors
๐ IOC Distribution
๐ Global Impact Map
๐ฅ Recent Activity
๐ฅ Recent Ransomware Victims
Loading...
| Victim Name | Ransomware Group | Sector | Country | Date Discovered | Ransom Site |
|---|---|---|---|---|---|
| Loading victims data... | |||||
๐ฐ Press Coverage
Loading...
| Title | Victim | Date | Country | Source |
|---|---|---|---|---|
| Loading press data... | ||||
๐บ Ransomware Groups
Loading...
| Group Name | Last Activity | Victims Count | Ransom Notes | Group Info |
|---|---|---|---|---|
| Loading groups data... | ||||
๐ IOC & YARA Rules
Loading...
Technical indicators and detection rules for ransomware groups. Sources: IOCs | YARA Rules
| Group | IOCs | YARA Rules | Total Indicators |
|---|---|---|---|
| Loading IOC data... | |||
๐ฏ Intel Purpose
Operational surface for tracking ransomware incidents, actor activity, and campaign movement across sectors and regions.
๐ฆ Ransomware Profile
Hostile malware operations that lock business assets, disrupt services, and extort victims for decryption or non-disclosure.
๐บ Threat Actors
Organized groups running dedicated intrusion, encryption, and leak-site workflows with repeatable tradecraft.
๐งฌ IOC & YARA
Detection-ready indicators and rule signatures used for triage, hunt operations, and containment validation.
๐ฅ Target Landscape
Observed victim footprint by industry and geography to support exposure assessment and defensive prioritization.
๐ง MALWATCHER
File Analysis
Assess file telemetry, detection intelligence, and behavior-based indicators.
URL / IP Analysis
Assess URL or IP reputation, threat indicators, and overall risk posture.
Hash Lookup
Lookup MD5 / SHA1 / SHA256 intelligence, verdict, and detections.
๐ต๐ปโโ๏ธ CVE VIGIL
๐ Total CVEs
---
๐ Unique Vendors
---
๐ฆ Total Products
---
๐จ Ransomware Related
---
โก + Daily
---
๐ + Weekly
---
๐๏ธ + Monthly
---
๐ + Yearly
---
EPSS Score Distribution
No CVE data in current filter
Known Ransomware Campaign Use
Known
Used in ransomware campaignsUnknown
No known ransomware useTop Affected Products
No affected products in current filter
Top Affected Vendors
No affected vendors in current filter
๐ CVE Addition Timeline
No timeline data in current filter
๐ Curated CVE List
Loading...
| CVE ID | Title | EPSS Range | Vendor | Product | ||
|---|---|---|---|---|---|---|
| Loading CVE data... | ||||||
๐ฏ Intel Purpose
Operational surface for prioritizing CISA KEV vulnerabilities by exploitation likelihood, asset exposure, and active campaign relevance.
๐ EPSS vs CVE Severity
EPSS estimates exploitation probability, while CVE record severity (usually CVSS) reflects impact. High impact does not always mean high exploitation likelihood.
๐งฎ EPSS Range & Percentile
Top line in EPSS Range column is the bucket label, bottom line is percentile ranking. Values marked with * use fallback estimation.
๐งฉ What is CWE?
CWE (Common Weakness Enumeration) is a taxonomy of software weakness types, for example SQL Injection or Improper Access Control. In triage, CWE helps map recurring root-cause patterns across different CVEs.
๐ฆ Ransomware Use Signal
Known means known ransomware campaign use in KEV.
Unknown means no known campaign-use flag in the current KEV entry.
๐ CVE Record Link
CVE ID is a direct link to the official CVE record for references, advisories, and metadata validation during triage.
ACCESS LOG
TOP OPERATIVES
CREATE NEW OPERATIVE
NEW OPERATIVE CREDENTIALS
โ SAVE THESE CREDENTIALS
REGISTERED OPERATIVES
DATA REDACTION
Data matching patterns will be COMPLETELY REMOVED from search results. Patterns are case-insensitive.