{
	"id": "77b922c0-323b-4aff-b9d3-e12e98de9f0d",
	"created_at": "2026-04-06T00:19:52.597556Z",
	"updated_at": "2026-04-10T03:32:13.271236Z",
	"deleted_at": null,
	"sha1_hash": "a4cdfb3fbe272b50626878eb03906e6b6e4dbd73",
	"title": "'Ransomed.vc' in the Spotlight - What is Known About the Ransomware Group Targeting Sony and NTT Docomo",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1159340,
	"plain_text": "'Ransomed.vc' in the Spotlight - What is Known About the\r\nRansomware Group Targeting Sony and NTT Docomo\r\nBy Pierluigi Paganini\r\nPublished: 2023-09-27 · Archived: 2026-04-05 13:05:51 UTC\r\n Pierluigi Paganini September 27, 2023\r\nFollowing the recently announced data leak from Sony, Ransomed.vc group\r\nclaimed the hack of the Japanese giant NTT Docomo.\r\nFollowing the recently announced data leak from Sony, the notorious ransomware syndicate Ransomed.vc\r\nannounced a new victim today in face of the largest Japanese telecommunication giant NTT Docomo. Notably, the\r\nannouncement came almost synchronously with the publication of the new leaked data from Sony shedding some\r\nlight on the precursor of the data breach. The bad actors are asking for $1,015,000 to be paid by the largest NTT\r\nDocomo. After Sony rejected to pay ransom demands, the bad actors leaked the exfiltrated data.\r\nResecurity, a global cybersecurity company protecting major Fortune 500 companies and government agencies,\r\ndetailed Ransomed.vc in their recent threat intelligence report. According to cybersecurity experts, Ransomed.vc,\r\nis the syndicate emerged from an underground forum and later became one of the most rapidly developing groups\r\nfor today in the Dark Web threatening large enterprises from the U.S., the U.K and European Union (EU).\r\nNotably, the actors chose a creative motto of being “online agency that is looking forward to put sanctions on the\r\nless that dared not to pay”. They used GDPR laws and data protection regulations to extort affected companies in\r\nhttps://securityaffairs.com/151550/data-breach/ransomed-vc-sony-ntt-alleged-attacks.html\r\nPage 1 of 2\n\nEU – if companies do not pay up, they make the stolen information public, which will lead to a regulatory fine, in\r\nsome cases exceeding the ransom payment in times.\r\nRansomed.vc released a 2.4 GB dump with leaked data from Sony containing source codes from SVN repository\r\nalong with credentials and a private SSH key presumably belonging to one of the software engineers.\r\nResecurity uncovered interesting connections to independent hacktivist groups which later united in alliances like\r\n“Five Families”, a coalition of several groups (STORMOUS, GhostSec, SigedSec, ThreatSec) previously\r\nresponsible for large-scale cybersecurity incidents. Collectively, their activities range from attacks on various\r\ngovernments to the publication of sensitive data from enterprises. For example, one of them, SiegedSec was\r\npreviously responsible for the publication of stolen data from NATO COI. These findings have been also\r\nconfirmed in the analysis by Karol Paciorek released by CSIRT KNF responsible for cybersecurity of the Polish\r\nfinancial sector. It is possible the actors behind the attack originate from several competing hacktivist groups\r\nwhich later transformed into ransomware operators.\r\nThe research follows a recent report by the Department of Homeland Security (DHS). According to the new\r\nDepartment of Homeland Security 2024 Homeland Threat Assessment between January 2020 and December\r\n2022, the number of known ransomware attacks in the United States increased by 47 percent. Ransomware\r\nattackers extorted at least $449.1 million globally during the first half of 2023 and are expected to have their\r\nsecond most profitable year. This is due to the return of “big game hunting”—the targeting of large organizations\r\n—as well as cyber criminals’ continued attacks against smaller organizations. Ransomware actors continue to\r\ntarget a variety of victims, almost certainly reflecting malicious cyber actors’ target refinement to entities\r\nperceived as the most vulnerable or likely to pay a ransom. In addition to disrupting the activities of targeted\r\nvictims, financially motivated criminal cyber actors will likely impose significant financial costs on the global\r\neconomy in the coming year.\r\nFollow me on Twitter: @securityaffairs and Facebook and Mastodon\r\nPierluigi Paganini\r\n(SecurityAffairs – hacking, Sony)\r\nSource: https://securityaffairs.com/151550/data-breach/ransomed-vc-sony-ntt-alleged-attacks.html\r\nhttps://securityaffairs.com/151550/data-breach/ransomed-vc-sony-ntt-alleged-attacks.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia"
	],
	"references": [
		"https://securityaffairs.com/151550/data-breach/ransomed-vc-sony-ntt-alleged-attacks.html"
	],
	"report_names": [
		"ransomed-vc-sony-ntt-alleged-attacks.html"
	],
	"threat_actors": [
		{
			"id": "d90307b6-14a9-4d0b-9156-89e453d6eb13",
			"created_at": "2022-10-25T16:07:23.773944Z",
			"updated_at": "2026-04-10T02:00:04.746188Z",
			"deleted_at": null,
			"main_name": "Lead",
			"aliases": [
				"Casper",
				"TG-3279"
			],
			"source_name": "ETDA:Lead",
			"tools": [
				"Agentemis",
				"BleDoor",
				"Cobalt Strike",
				"CobaltStrike",
				"RbDoor",
				"RibDoor",
				"Winnti",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "93b7776d-9b37-496d-94a5-30bc36fd8800",
			"created_at": "2023-11-07T02:00:07.10019Z",
			"updated_at": "2026-04-10T02:00:03.407781Z",
			"deleted_at": null,
			"main_name": "GhostSec",
			"aliases": [
				"Ghost Security"
			],
			"source_name": "MISPGALAXY:GhostSec",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "c29ed071-678d-4023-a954-7138fb534056",
			"created_at": "2023-11-05T02:00:08.079228Z",
			"updated_at": "2026-04-10T02:00:03.39948Z",
			"deleted_at": null,
			"main_name": "SiegedSec",
			"aliases": [],
			"source_name": "MISPGALAXY:SiegedSec",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "adf68b66-8287-44de-9cdc-3277508a8126",
			"created_at": "2023-11-05T02:00:08.082461Z",
			"updated_at": "2026-04-10T02:00:03.400457Z",
			"deleted_at": null,
			"main_name": "RansomVC",
			"aliases": [
				"Ransomed.vc"
			],
			"source_name": "MISPGALAXY:RansomVC",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "e3eca3b8-5c00-4d5b-997f-61450ecd598a",
			"created_at": "2024-01-09T02:00:04.20862Z",
			"updated_at": "2026-04-10T02:00:03.513149Z",
			"deleted_at": null,
			"main_name": "Threatsec",
			"aliases": [],
			"source_name": "MISPGALAXY:Threatsec",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434792,
	"ts_updated_at": 1775791933,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a4cdfb3fbe272b50626878eb03906e6b6e4dbd73.pdf",
		"text": "https://archive.orkl.eu/a4cdfb3fbe272b50626878eb03906e6b6e4dbd73.txt",
		"img": "https://archive.orkl.eu/a4cdfb3fbe272b50626878eb03906e6b6e4dbd73.jpg"
	}
}