mor3intel logo
mor3intelThreat Intelligence
DashboardVictimsGroupsCountriesStatsATT&CKRulesIOC Lookup
InstagramTelegram
5 Active Threats
Threat Intelligence Platform

Ransomware Intelligence & Incident Response

Search ransomware groups, view attack tactics mapped to MITRE ATT&CK, analyze IOCs, and access recovery guidance for your incident response team.

Cached StatsUsing cached data

13

Active Groups

32

IOCs Tracked

36

MITRE Tactics

15

Groups Profiled

MITRE ATT&CK Insights

Attack framework intelligence mapped across tactics and threat groups

Full Navigator
Tactics

14

Techniques

93

Ransomware TTPs

46

Active APTs

15

Attack Kill Chain -- Technique Density
Recon
10
Resources
7
Initial Access
9
Execution
6
Persistence
7
Priv Esc
4
Def Evasion
7
Cred Access
6
Discovery
8
Lat Movement
5
Collection
5
C2
7
Exfiltration
5
Impact
7
Explore all tactics
Most Prevalent Techniques
1

Data Encrypted for Impact

T1486

95%
2

Phishing

T1566

90%
3

Command and Scripting Interpreter

T1059

90%
4

Exploit Public-Facing Application

T1190

85%
5

Valid Accounts

T1078

85%
View all techniques
Tracked Threat Groups by Origin
All groups
Russia

6

APT28, APT29

North Korea

3

Lazarus Group, Kimsuky

China

3

APT41, Salt Typhoon

Iran

2

Magic Hound, Fox Kitten

Unknown

2

Scattered Spider, Akira

Active Ransomware Groups

Currently tracked threat actors with recent activity

LockBit
aka LockBit 3.0, LockBit Black
active

LockBit is a Ransomware-as-a-Service (RaaS) operation that has been one of the most prolific ransomware groups globally. Known for its fast encryption speed and double extortion tactics, LockBit operates an affiliate program and maintains a leak site for publishing stolen data.

First seen: 2019-09
4 regions
HealthcareManufacturingFinancial Services+2
6 tactics5 IOCs
View details
BlackCat (ALPHV)
aka ALPHV, Noberus
active

BlackCat/ALPHV is a sophisticated Ransomware-as-a-Service operation written in Rust, making it cross-platform capable. Known for triple extortion tactics including data encryption, data theft threats, and DDoS attacks.

First seen: 2021-11
3 regions
HealthcareLegal ServicesTechnology+2
3 tactics2 IOCs
View details
Cl0p
aka Clop, TA505
active

Cl0p is a ransomware operation known for exploiting zero-day vulnerabilities in file transfer solutions like MOVEit, GoAnywhere, and Accellion FTA. They focus heavily on data theft and extortion without always deploying encryption.

First seen: 2019-02
3 regions
Financial ServicesHealthcareGovernment+2
2 tactics2 IOCs
View details
Black Basta
aka BlackBasta
active

Black Basta emerged in 2022 and is believed to be comprised of former Conti ransomware members. They use QakBot and other malware for initial access and are known for rapid encryption.

First seen: 2022-04
2 regions
ManufacturingConstructionHealthcare+1
2 tactics2 IOCs
View details
Royal
aka Royal Ransomware, BlackSuit
active

Royal ransomware is operated by experienced threat actors, potentially former Conti members. They use callback phishing and target critical infrastructure.

First seen: 2022-09
2 regions
HealthcareEducationManufacturing+1
1 tactics1 IOCs
View details
Akira
aka Akira Ransomware
active

Akira is a ransomware operation that emerged in March 2023 with a retro 1980s-themed leak site. The group primarily targets small to medium businesses and has been linked to the now-defunct Conti ransomware gang. They employ double extortion tactics and have shown rapid growth.

First seen: 2023-03
3 regions
EducationFinanceReal Estate+2
3 tactics3 IOCs
View details
Play
aka PlayCrypt, Play Ransomware
active

Play ransomware (also known as PlayCrypt) emerged in mid-2022 and has targeted numerous organizations including critical infrastructure. The group is known for exploiting ProxyNotShell vulnerabilities and other Exchange Server flaws.

First seen: 2022-06
3 regions
GovernmentHealthcareTechnology+2
2 tactics2 IOCs
View details
Rhysida
aka Rhysida Ransomware
active

Rhysida is a ransomware group that emerged in May 2023 and has quickly become a significant threat, particularly to the healthcare and education sectors. They operate a leak site and use double extortion tactics.

First seen: 2023-05
4 regions
HealthcareEducationGovernment+2
2 tactics2 IOCs
View details
BianLian
aka BianLian Ransomware
active

BianLian is a ransomware group written in Go that shifted from encryption-based attacks to pure data extortion in early 2023 after a decryptor was released. They focus on exfiltrating data and threatening publication.

First seen: 2022-06
3 regions
HealthcareProfessional ServicesManufacturing+2
2 tactics2 IOCs
View details
Medusa
aka Medusa Ransomware, MedusaLocker
active

Medusa is a ransomware group that operates both as standalone attacks and through an affiliate RaaS model. They are known for their aggressive negotiation tactics and have a leak site called 'Medusa Blog'.

First seen: 2021-06
3 regions
HealthcareEducationLegal+2
2 tactics2 IOCs
View details
8Base
aka 8Base Ransomware
active

8Base is a ransomware group that emerged in 2023 and rapidly grew to become one of the most active threat actors. They use a modified version of Phobos ransomware and target small to medium businesses.

First seen: 2023-03
3 regions
Business ServicesManufacturingConstruction+2
2 tactics2 IOCs
View details
Cactus
aka Cactus Ransomware
active

Cactus ransomware is known for its unique self-encryption technique to evade detection. The ransomware encrypts itself to avoid antivirus detection and exploits VPN appliance vulnerabilities for initial access.

First seen: 2023-03
3 regions
TechnologyManufacturingLegal+2
3 tactics2 IOCs
View details
INC Ransom
aka INC Ransomware
active

INC Ransom is a ransomware operation that emerged in mid-2023, known for exploiting Citrix NetScaler vulnerabilities (Citrix Bleed) and targeting healthcare organizations. They operate a leak site and use double extortion.

First seen: 2023-07
2 regions
HealthcareEducationGovernment+1
2 tactics2 IOCs
View details
What to Do if You Are Compromised
Immediate response steps for active ransomware incidents
1

Isolate Affected Systems

Disconnect compromised systems from the network immediately. Do not power off - preserve memory for forensics.

2

Activate Incident Response Team

Notify your IR team, management, and relevant stakeholders. Consider engaging external IR support.

3

Preserve Evidence

Create forensic images of affected systems. Document all observations with timestamps.

4

Block Known IOCs

Update firewall rules and security tools to block known indicators of compromise.

5

Assess Scope of Compromise

Identify all affected systems, accounts, and data. Determine initial access vector if possible.

6

Secure Backups

Verify backup integrity and ensure backups are not connected to compromised networks.

Important

Do not pay the ransom without consulting legal counsel and law enforcement. Payment does not guarantee data recovery and may fund criminal operations. Report incidents to FBI IC3, CISA, or your local authorities.

mor3intel logomor3intel

This platform is intended for defensive cybersecurity, incident response, and recovery purposes only. Information provided is for educational and defensive use.

@mor3cod3@mor3cod3
© 2026 mor3intel