{
	"id": "2d0458c7-0b01-4f29-bc40-516902321d3a",
	"created_at": "2026-04-06T03:37:46.045832Z",
	"updated_at": "2026-04-10T13:12:21.24339Z",
	"deleted_at": null,
	"sha1_hash": "24f04528965583ce980b513fad5016c52c838744",
	"title": "Avaddon ransomware launches data leak site to extort victims",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 3216396,
	"plain_text": "Avaddon ransomware launches data leak site to extort victims\r\nBy Lawrence Abrams\r\nPublished: 2020-08-10 · Archived: 2026-04-06 03:10:01 UTC\r\nAvaddon ransomware is the latest cybercrime operation to launch a data leak site that will be used to publish the stolen data\r\nof victims who do not pay a ransom demand.\r\nSince the Maze operators began publicly leaking files stolen in ransomware attacks, other operations soon followed suit and\r\nbegan creating data leak sites to publish stolen files.\r\nThese sites are designed to scare victims into paying a ransomware under threat that their files will be leaked to the public. If\r\npublicly released, this data could expose financial information, personal information of employees, and client data, which\r\nleads to a data breach.\r\nhttps://www.bleepingcomputer.com/news/security/avaddon-ransomware-launches-data-leak-site-to-extort-victims/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/avaddon-ransomware-launches-data-leak-site-to-extort-victims/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nCybersecurity intelligence firm Kela has told BleepingComputer that the Avaddon ransomware operators have announced on\r\na Russian-speaking hacker forum this weekend that they have launched a new data leak site.\r\nAvaddon post to a hacker forum\r\nAt this time, there is only one entry on their site, where they leak 3.5MB of documents stolen from a construction company.\r\nAvaddon ransomware data leak site\r\nThe use of data leak sites is a tactic that is not going away, and corporate victims need to accept that all ransomware attacks\r\nare now data breaches.\r\nThe attackers are hoping that the extra costs associated with data breaches and the potential reputational harm may push\r\nmore victims into paying the ransom.\r\nWith ransomware attacks escalated into data breaches, companies must disclose the breach to their employees and clients, so\r\nthey are aware of the potential risks and act accordingly to protect themselves.\r\nhttps://www.bleepingcomputer.com/news/security/avaddon-ransomware-launches-data-leak-site-to-extort-victims/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/avaddon-ransomware-launches-data-leak-site-to-extort-victims/\r\nhttps://www.bleepingcomputer.com/news/security/avaddon-ransomware-launches-data-leak-site-to-extort-victims/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/avaddon-ransomware-launches-data-leak-site-to-extort-victims/"
	],
	"report_names": [
		"avaddon-ransomware-launches-data-leak-site-to-extort-victims"
	],
	"threat_actors": [],
	"ts_created_at": 1775446666,
	"ts_updated_at": 1775826741,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/24f04528965583ce980b513fad5016c52c838744.pdf",
		"text": "https://archive.orkl.eu/24f04528965583ce980b513fad5016c52c838744.txt",
		"img": "https://archive.orkl.eu/24f04528965583ce980b513fad5016c52c838744.jpg"
	}
}