🎵Summertime Sadness - Lana Del Rey
🎵Smells like Team Spirit - Nirvana
🎵Wake me Up - Avicii
🎵揺れた歪んだ世界にだんだん僕は - Unravel by Tokyo Ghoul
Posts by THE RAVEN FILE
🔐🎵 #EMBARGO #RANSOMWARE - ADDING LYRICS AS MUTEX
📌KissMeHardBeforeYouGo
📌LoadUpOnGunsBringYourFriends
📌WakeMeUpWhenItsAllOver
📌揺れた歪んだ世界にだんだん僕は
Sample: github.com/TheRavenFile...
#Security #Infosec #OSINT #ThreatIntelligence #Hack #ThreatIntel #DarkWeb #Malware
TENGU RANSOMWARE
#Tengu #Ransomware #Security #infosec #OSINT #darkweb #cybersecurity #ThreatIntelligence #ThreatIntel
theravenfile.com/2026/03/10/t...
🔒LockBit adopted a clean Host for their TORRENT LEAK!
START2 LLC - A 13-year old Russian BGP Network (AS61400) with less malicious sightings!
📍185.16.215.189 🇷🇺
📍185.16.215.140 🇷🇺
🏢 Start2 LLC 🇷🇺
#Lockbit #Ransomware #DataBreach #DarkWeb #Data #ThreatIntel #CyberSecurity #CyberSec #Infosec
Akira Ransomware Negotiation
#Akira #Ransomware #Security #DarkWeb #Infosec #CyberSecurity #DataBreach #Dataleak #Privacy #Infostealer #Malware #FBI #CISA #OSINT
🚨NEW RESEARCH ALERT: LOGICAL LIMITATIONS OF AI MODELS IN THREAT INTELLIGENCE
theravenfile.com/2026/02/05/l...
#Google #Microsoft #AI #LLM #AIModel #ThreatIntelligence #ThreatHunting #OSINT #CyberSecurity #CyberSec #Infosec #Hack #PromptInjection #ChatGPT #Gemini #Phishing #OpenAI
6oeuvb4fq65xlrft2ezxjmkeqnu7oafbsevrr3ocer27wft6ivvhstqd.onion
ryrw2ojab62yij4y33ssfgvm2d2vwt3tcqetu6qmpwznqhooqxz3wpqd.onion
#GUNRA #RANSOMWARE INTEL
theravenfile.com/2025/09/23/g...
nsnhzysbntsqdwpys6mhml33muccsvterxewh5rkbmcab7bg2ttevjqd.onion
tgsst34i6z4mwdj2kpigixxb3k3xfz7xhuqnsowvfvyu3snm6nv4s5ad.onion
myeli53ogsryjg2kob4xqxtwkr5oc5zj7jr5fcfizpytwe566k5thxyd.onion
#security #hack #DarkWeb #OSINT #malware #TOR
Lockbit Ransomware new Torrent Domains
theravenfile.com/2024/06/26/t...
#lockbit #ransomware #databreach #security #OSINT #darkweb #infosec #hack
🚨 #MedusaLocker #Ransomware Resurges in 2025 – Don't Confuse it with "Medusa" Group! 🐍🔒
2025 Spike
Hosted 🇷🇺
Old Onion → New Onion🧅♻️
#NodeJS Ticketing Exposed
theravenfile.com/2025/12/24/r...
#ThreatIntel #infosec #IOCs #CyberSecurity #security #DarkWeb #Malware #TOR #Malware
💡Out of 9 above mentioned IPs, 5 are overlapped with Clop Ransomware 0-Day EBS Data Leak Batch
💡This strongly suggests that a shared network (for Torrent) is seen among Ransomware Groups
💡LockBit continues to serve the Data Leaks via same Servers which were active a couple of months back!
💡All the IPs recorded are from Russia 🇷🇺
💡Interestingly, Cl0p Ransomware group also makes use of same network for their Data Leaks (via Torrent)
🌊 LOCKBIT 5.0 Data Leaks from same Torrent Nodes 🇷🇺
31.200.249.130
31.200.249.146
31.200.249.178
31.200.249.227
31.200.249.231
31.200.249.233
31.200.249.237
185.183.34.95
185.191.59.69
#LockBit #Ransomware #Security #Infosec #OSINT #Clop #Cl0p #DataLeak #DataBreach #DarkWeb #Malware
🚨 #React2Shell #Exploit (CVE-2025–55182)
Found #OpenDir!
☢️Big names like Porsche,Starbucks, OpenAI,SoundCloud on the list!
154.61.77.105 🇮🇳
🎯21 Fintech companies🏦
🎯14 Food & Beverage🍲
Report
theravenfile.com/2025/12/12/r...
#CyberSecurity #Infosec #OSINT #DarkWeb #DeepWeb #Malware #Cryptomining
📌On 4th December 2025; the group had announced 23 new victims on their DLS, by scrapping old Data leaks
📌Upon analyzing, it is found that 11 victims are recycled from April 2025 LockBit Leaks
📌2 Victims are from #Weyhro and #RansomHouse Group
#malware #TOR #CyberSecurity
🚨Exposing #LOCKBIT 5.0 Server: IP & DOMAIN
IP: 205.185.116.233 🇺🇸
#AS53667
Domain: karma0[.]xyz
Reg: 2 November 2025
💡LockBit Group uses #Smokeloader in their attacks
MD5: e818a9afd55693d556a47002a7b7ef31
#Lockbit5 #Ransomware #Security #Intelligence #OSINT #Databreach
While analyzing #Warlock #Ransomware, repeated Mutex found, leaked in #Conti Leaks!
MUTEX: hsfjuukjzloqu28oajh727190
CONTI: 2021
LOCKBIT GREEN: 2023
CERBER: 2023
2025
DRAGONFORCE
DEVMAN
D0GLUN
WARLOCK
#CyberSecurity #CyberSec #Infosec #hack #OSINT #Security #DarkWeb #Malware
🚨DragonForce Ransomware: Real IP
46.29.238.160 🇳🇴
AS 215540 🇷🇺
📌Appears to be an IP associated with Ether VPN
📌The same ASN was found to be used by AKIRA Ransomware in August 2025
#DragonForce #Ransomware #DarkWeb #Security #InfoSec #Hack #CyberSecurity #CyberSec #Exploit #Akira
While analyzing few samples of #Lockbit 5.0, an interesting fact found!🤨
Most Samples share same VHash,which is: 075056657d15151"z
theravenfile.com/2024/06/26/t...
#ransomware #DarkWeb #CyberSecurity #CyberSec #InfoSec #CyberSecurityTips #ThreatHunting #ThreatIntelligence #ThreatIntel #Security
🚨 NEW: #Clop (cl0p) #Ransomware Network!
Dissected 96 IPs
77.8% #subnet reuse
#MOVEit still active Fresh #Oracle #EBS zero-day (#CVE-2025-61882) in the wild
Full report: theravenfile.com/2025/11/04/c...
#DarkWeb #Infosec #Security #Hack #ThreatIntel #ZeroDay #OSINT #TOR #Exploit
🚨Spotting Stealthy #CLEARFAKE Campaign!!
With following #Powershell Command Snippet, I was able to pull some fresh cases of ClearFake!
"POwErsHeLL -w 1 &"
IP
83.219.248.37
172.67.202.94
172.67.219.189
199.188.201.106
83.219.248.37
172.67.132.82
172.67.202.94
github.com/TheRavenFile...
📌Both group resembles same, however their targeted victims are different
📌Salt Typhoon targets global entities except CIS, however Space Pirates targets only CIS including Russian Aerospace and Critical Plants
📌The catch here is: Different names assigned to same loader, but for different APT Groups
📌SNAPPYBEE Loader = Salt Typhoon
📌DEED RAT = Space Pirates
📌DEED RAT was initially used by Space Pirates, then used by Salt Typhoon in recent campaigns
CHINESE APT OVERLAP: SALT TYPHOON X SPACE PIRATES 🇨
💡A sample is found overlapped with 2 Threat Actors from different timeline!
MD5: 5d0aa944ce19e0a70adad562ce0e7880
#SaltTyphoon #APT #SpacePirates #OSINT #Security #InfoSec #Malware #CyberCrime #CyberSecurity #ThreatIntelligence #ThreatIntel
🚨Clop Releases #Oracle E-Business Suite 0Day Victims: CVE-2025-61882
31.200.249.227: Used by #LockBit and #Clop
AS216158 🇷🇺
Teleport Rus LLC
31.200.249.130
31.200.249.146
31.200.249.178
31.200.249.233
#Cl0p #Ransomware #Security #InfoSec #Hack #DataBreach #Hack #CyberSecurity #CyberSec
🚨OBSCURA RANSOMWARE DATA BREACH VIA I2P NETWORK
💡2 leaks are hosted in I2P network via P2P Magnet Share
📌Initially found in September 2025
📌Infected about 9 Victims, US tops the list
📌Most Data leaks are not present
📌Previously, the Ransomware that used I2P was Pay2Key from Iran 🇮🇷
🔐 #GUNRA #RANSOMWARE - WHAT YOU DON'T KNOW!
Just dove into a deep analysis of Gunra ransomware
📖 Check out: theravenfile.com/2025/09/23/gunra-ransomware-what-you-dont-know/
#Cybersecurity #ThreatIntel #InfoSec #DarkWeb #OSINT #CyberSec #Hack #DataBreach #Malware #Conti
🚨BREAKING: PEAR Ransomware Group uses infra/template of APOS Ransomware
💡Both DLS were using same CSS file titled "AposPanel.styles.css"
#APOS #Ransomware #PEAR #Malware #DarkWeb #DeepWeb #Infosec #Security #OSINT #CyberSecurity #Cybersec #TOR #ThreatIntelligence #ThreatIntel #DataBreach
#TZULO: Fav. Host of #UNC6040🇺🇸
Malicious events:-
📌LLM Hijacking
📌Fortigate VPN Bruteforce
📌ZynorRAT, AsyncRAT, RemcosRAT, AgentTesla, GuLoader, QakBot, RecordBreaker
📌#SAFEPAY #Ransomware 68.235.46[.]80
github.com/TheRavenFile...
#Salesloft #Salesforce #CyberSecurity #InfoSec #OSINT #Darkweb