Cybernews presented Ransomlooker, a tool to monitor ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide.
The researchers have created the tool to help cybersecurity experts in their daily jobs by providing real-time updates and actionable insights. It offers various statistical insights into data, the ability to determine attack perpetrators, and incorporates filtering by country, industries, time span, and other parameters for journalistic investigations.
Tool advantages:
With a broad range of knowledge in various cyber security topics, the experienced Cybernews researchers team can give detailed comments on ransomware attacks and analyze different threat actors’ activities in-depth.
“Our ransomware monitoring tool, Ransomlooker, employs advanced algorithms to track and analyze ransomware groups’ activities continuously. It constantly scans the dark web and other hidden corners of the internet where ransomware operators tend to operate, identifying new extortion sites and monitoring their claims. By aggregating and consolidating this data, Ransomlooker provides real-time updates and actionable insights to its users, helping them stay one step ahead of potential threats.” reads the announcement. “With Ransomlooker, you can proactively safeguard your business or personal data from ransomware attacks. Our tool ensures you are promptly informed about emerging ransomware campaigns and the tactics used by attackers. By staying vigilant and informed, you can take timely measures to protect your systems and data, reducing the risk of falling victim to ransomware.”
You can access Ransomlooker here:
https://cybernews.com/ransomlooker/
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Ransomlooker)
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.