π’ New #Insomnia ransomware gang.
β’οΈ Active since October 2025, 17 victims published on their data leak site.
ππΌ Onion link and TOX ID already available on #deepdarkCTI github.com/fastfire/dee...
@fastfire.bsky.social
Head of Cyber Threat Intelligence @ WΓΌrth Group, GCTI/CPENT/CEH/CND/CSA/ECSA/ECIH/CTIA, owner of SATAYO CTI platform & deepdarkCTI - member of @CuratedIntel
π’ New #Insomnia ransomware gang.
β’οΈ Active since October 2025, 17 victims published on their data leak site.
ππΌ Onion link and TOX ID already available on #deepdarkCTI github.com/fastfire/dee...
π How is the ransomware gang landscape evolving after the #RAMP forum seizure?
π΄ Another well-known forum seems to be becoming a point of reference in this field.
ππΌ We discuss it in the article you can read at this link www.neteye-blog.com/2026/02/from...
With 2025 now behind us, we can make some observations regarding the landscape of double-extortion #ransomware #attacks.
β Which ransomware gangs were the most active?
β Which sectors and countries were most affected?
ππ» Read the full article here www.neteye-blog.com/2026/01/rans...
π’ Recap of what happened in #deepdarkCTI in 2025:
β
586 commits
β
35 contributors
β
6,400 stars on GitHub
β
8 articles on www.deepdarkcti.com
β
129 active users within the Telegram channel
β
a total of 2,465 sources
π Many thanks to the #deepdarkCTI community!
A new interview is available on the #deepdarkCTI project blog. This time, the interview concerns the #Benzona ransomware gang.
π You can read the full interview here deepdarkcti.com/interview-8-...
@ichinin.bsky.social I don't think you read the article carefully; perhaps you just looked at the image. The indicators provided are always contextualized within an analysis ticket. So, yes, it's intelligence.
06.11.2025 12:12 β π 0 π 0 π¬ 1 π 0π΄The problem of properly integrating #Threat #Intelligence into #Security #Operations processes is a recurring one.
π I wrote an article in which I described the integration process we have implemented.
ππ» Read the article here www.neteye-blog.com/2025/11/embe...
#Ransomware π£ NEW FEATURE
La nuova sezione RF Domain Monitor permette il monitoraggio costante dei domini sotto controllo #Ransomfeed e di deepdarkCTI project (@fastfire.bsky.social), alla ricerca di variazioni DNS e law enforcement.
1/2
π’ We interviewed Gabi, a member of the #Cyber ββ#Toufan group. This group, active since October 2024, has carried out several attacks against #Israeli targets.
The full interview is available at the link deepdarkcti.com/interview-7-...
π’ At deepdarkcti.com/details-of-t..., you can find a detailed timeline of the main events related to the alleged seizure of the #XSS forum.
β° The timeline is constantly updated, taking into account relevant events that are also occurring in recent days.
#deepdarkCTI
π’ A new interview is available on the #deepdarkCTI website. This time, community member #Erez interviewed the founder of the #Devman ransomware gang.
ππ» You can read the full interview at this link deepdarkcti.com/interview-6-...
If you want to contribute, I created this project where I'm cataloging the Telegram channels of the various groups related to the Israel-Iran conflict, shared by @cyberknow.bsky.social github.com/fastfire/Isr...
18.06.2025 20:31 β π 1 π 0 π¬ 0 π 0π’ New Critical Vulnerabilities Disclosed for Citrix Netscaler support.citrix.com/support-home...
17.06.2025 18:49 β π 1 π 0 π¬ 0 π 0We interviewed #Se7en, the founder of #Exodus #Market, a platform for selling #infostealers #logs.
Read the full interview here deepdarkcti.com/interview-5-...
New ransomware gang #RunSomeWares DLS. 4 victims claimed. Already indexed on #deepdarkCTI
27.02.2025 15:40 β π 3 π 0 π¬ 0 π 0New ransomware gang #Anubis DLS. Already indexed on #deepdarkCTI
24.02.2025 23:00 β π 0 π 0 π¬ 0 π 0βοΈ New data leak site: #Kraken ransomware gang. The gang seems to be simply a rebrand of #HelloKitty, as of the 5 victim organizations already declared, 2 (Cisco and CDProject) had already been previously declared.
π― The DLS link has already been added to #deepdarkCTI (github.com/fastfire/dee...).
Some updates regarding the #Gravy #Analytics data breach. I analyzed part of the data shared by TA #nightly on #XSS forum. Some of the numbers involved:
13473 applications
396115 ip
3317 organizations
43586 locations
11 countries
330543 partners email accounts
Happy Holidays to the amazing #deepdarkCTI community! Our project has reached 4600 stars this year, since the beginning of the project we have had 93 contributors, in the private Telegram channel there are about 100 users, we have counted over 1900 sources! Thank you all so much!
23.12.2024 11:49 β π 2 π 0 π¬ 1 π 0If you don't already... consider following and supporting #deepdarkCTI github.com/fastfire/dee...
10.12.2024 21:11 β π 12 π 3 π¬ 0 π 0When you work together with friends, everything is easier! #CyberSec #ThreatIntelligence
10.12.2024 20:55 β π 1 π 0 π¬ 0 π 0Great list @oxley.io! If you would consider adding my account... thanks!
10.12.2024 20:50 β π 0 π 0 π¬ 0 π 0