The Infamous Ransomware RansomHouse Group Hits: [DISCLOSED]Sibanye-Stillwater in a recent cyber attack, raising concerns about cybersecurity vulnerabilities. To stay ahead of emerging threats, fortify your online security with the HookPhish Dark Web Monitoring platform. Explore HookPhish Dark Web Monitoring.
Victim Name | [DISCLOSED]Sibanye-Stillwater |
Victim Website (if available) |
hXXps://www[.]sibanyestillwater[.]com |
Description | Sibanye-Stillwater is one of the world’s largest primary producers of platinum, palladium, and rhodium and is a top tier gold producer. It also produces and refines iridium and ruthenium, nickel, chrome, copper and cobalt. The Group has recently begun to diversify its asset portfolio into battery metals mining and processing and increase its presence in the circular economy by growing its recycling and tailings reprocessing exposure globally. |
Scraped Date | 2024-08-15T15:51:49.407Z |
Encrypted Date | 11/07/2024 |
Company Revenue | $6.3 Billion |
Employee Count | 63220 |
Amount of Files | 1.2 Tb |
Disclosure Status | DISCLOSED |
Disclosure Date | 15/08/2024 |
Evidence Pack Downloadable | YES |
Full Data Dump Downloadable | NO |
Additional Information | N/A |
Number of Dark Web Post Views (at the time of scraping) | 100 |
RansomHouse Ransomware Group
The ‘RansomHouse’ group is a data-extortion cybercrime operation that emerged in December 2021. Unlike traditional ransomware groups, RansomHouse claims not to use ransomware and instead focuses on breaching networks through their own tools. The group employs a double-extortion model, exfiltrating data and threatening to publish it if ransom demands are not met. RansomHouse has been associated with high-profile attacks, with victims listed on its data leak site, and has targeted various organizations, including a German airline support service provider and Canada’s Saskatchewan Liquor and Gaming Authority (SLGA).
Citations:
- [1] https://bleepingcomputer.com/news/security/new-ransomhouse-group-sets-up-extortion-market-adds-first-victims/
- [2] https://techtarget.com/searchsecurity/news/366563096/How-ransomware-gangs-are-engaging-and-using-the-media
- [3] https://globalinitiative.net/analysis/conti-ransomware-group-cybercrime/
- [4] https://hhs.gov/sites/default/files/8base-ransomware-analyst-note.pdf
- [5] https://techcrunch.com/2022/06/28/amd-extortion-ransomhouse/
Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any files or stolen information. Any legal concerns regarding the content should be directed at the attackers, not HookPhish. This blog is dedicated to posting editorial news, alerting readers about companies falling victim to ransomware attacks. HookPhish has no affiliation with ransomware threat actors or groups, and it does not host infringing content. The information on this page is automatically generated and redacted, sourced directly from the Onion Dark Web Tor Blogs pages.