Ransomware Group intelligence
Linkc
ActiveTrack Linkc with 4 published victims and 1 known leak locations in a single intelligence view.
Overview
Linkc is tracked by Breach House as a ransomware group with 4 published victims.
United States is currently the most targeted country in this dataset.
1 known leak locations are currently associated with this group.
Top Countries
Interactive distribution based on the currently visible victims list.
Known Leak Locations (1)
| Label | Type | Availability | Links |
|---|---|---|---|
| Leak location 1 | Onion service | Unknown | iywqjjaf2zioehzzauys3sktbcdmuzm2fsjkqsblnm7dt6axjfpoxwid.onion |
Top Activity Sectors
No sector intelligence available.
Ransom Notes (0)
▼No ransom notes available for this group.
Tools Used
▼No tools used available.
YARA Rules (0)
▼No YARA rules available.
Indicators of Compromise (0)
▼No IoCs available for this group.
Negotiation Chats (0)
▼No negotiation chats available.
Research Sources
No external research sources linked yet.
Victims (4)
Search, filter and paginate the victim timeline for Linkc.
| Type | Target | Discovered | Country | Business Category | Intel Link |
|---|---|---|---|---|---|
| Ransomware | Sajet Products id28016 View details | Manufacturing / Engineering | |||
|
700mb of blueprints including Amazon LEO (satellite) Project Kuiper scheme, Airbus, Boeing engines and metal alloy technologies. Enjoy. https://amber-wooden-prawn-35.mypinata.cloud/ipfs/bafybeic5m7e3dvlunitnv6vxzbcvqqgm4pybgc3ykn3jo62jipshf6bjve |
|||||
| Ransomware | StrongLink id28015 View details | IT | |||
|
DOWNLOAD SAMPLE: https://amber-wooden-prawn-35.mypinata.cloud/ipfs/bafybeian2lxaye6gwvi2kztzfpyr2lokzfngai3d4zjmtgqhhv74ixsvi4 |
|||||
| Ransomware | Network Technology Services of New Jersey id28014 View details | United States | IT | ||
|
Whole datacenter is encrypted. Waiting for you in chat. |
|||||
| Ransomware | h2o.ai id17627 View details | United States | Communication / Marketing | ||
|
As a result of our operation, we have discovered the following concerning data: 1. Unanonymized customer datasets intended for AI training. 2. Full source code of programs from the Git repository, including code for driverless systems, GPT models, and others. 3. A substantial amount of internal information, including contracts, customer personal data, project costs, and project documentation. 4. Backup copies of employee email accounts containing customer correspondence. |
|||||