The Infamous Ransomware RansomHouse Group Hits: HAL Allergy in a recent cyber attack, raising concerns about cybersecurity vulnerabilities. To stay ahead of emerging threats, fortify your online security with the HookPhish Dark Web Monitoring platform. Explore HookPhish Dark Web Monitoring.
Victim Name | HAL Allergy |
Victim Website (if available) |
hXXps://www[.]hal-allergy[.]com/ |
Description | HAL Allergy is one of the European top players in the development, production and distribution of allergen immunotherapies for the treatment and prevention of allergic diseases. With a highly competitive product portfolio, including subcutaneous and sublingual products, and a future-oriented pipeline portfolio, HAL Allergy strives to provide the best possible medical products and scientific output. HAL Allergy is located in the Bio Science Park in Leiden, The Netherlands. |
Scraped Date | 2024-02-29T08:04:15.851Z |
Encrypted Date | 18/02/2024 |
Company Revenue | $61,1Million |
Employee Count | 295 |
Amount of Files | about 105Gb |
Disclosure Status | EVIDENCE |
Disclosure Date | DEPENDS ON YOU |
Evidence Pack Downloadable | YES |
Full Data Dump Downloadable | NO |
Additional Information | N/A |
Number of Dark Web Post Views (at the time of scraping) | 469 |
The use of any indicators of compromise (IOCs) or information obtained through cybersecurity research for any purpose other than cybersecurity is not condoned by HookPhish. Any links or references to anything potentially sensitive are being shared for cybersecurity purposes only and are not intended to promote or facilitate any illegal activities. Always consider the potential legal and ethical implications of your actions utilising this information.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.
RansomHouse Ransomware Group
The ‘RansomHouse’ group is a data-extortion cybercrime operation that emerged in December 2021. Unlike traditional ransomware groups, RansomHouse claims not to use ransomware and instead focuses on breaching networks through their own tools. The group employs a double-extortion model, exfiltrating data and threatening to publish it if ransom demands are not met. RansomHouse has been associated with high-profile attacks, with victims listed on its data leak site, and has targeted various organizations, including a German airline support service provider and Canada’s Saskatchewan Liquor and Gaming Authority (SLGA).
Citations:
- [1] https://bleepingcomputer.com/news/security/new-ransomhouse-group-sets-up-extortion-market-adds-first-victims/
- [2] https://techtarget.com/searchsecurity/news/366563096/How-ransomware-gangs-are-engaging-and-using-the-media
- [3] https://globalinitiative.net/analysis/conti-ransomware-group-cybercrime/
- [4] https://hhs.gov/sites/default/files/8base-ransomware-analyst-note.pdf
- [5] https://techcrunch.com/2022/06/28/amd-extortion-ransomhouse/
Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any files or stolen information. Any legal concerns regarding the content should be directed at the attackers, not HookPhish. This blog is dedicated to posting editorial news, alerting readers about companies falling victim to ransomware attacks. HookPhish has no affiliation with ransomware threat actors or groups, and it does not host infringing content. The information on this page is automatically generated and redacted, sourced directly from the Onion Dark Web Tor Blogs pages.