The Infamous Ransomware RansomHouse Group Hits: Webber International University in a recent cyber attack, raising concerns about cybersecurity vulnerabilities. To stay ahead of emerging threats, fortify your online security with the HookPhish Dark Web Monitoring platform. Explore HookPhish Dark Web Monitoring.
Victim Name | Webber International University |
Victim Website (if available) |
hXXps://www[.]webber[.]edu/ |
Description | We have been recognized by the Princeton Review as one of “America’s Best Value Colleges” and a “Best in the Southeast” school. Established in 1927 as one of the first business schools for women in the nation, Webber now hosts men and women from over 48 different nations. Established in 1896 as Flora Macdonald College, St. Andrews University (a branch of Webber International University, formerly known as St. Andrews Presbyterian College) joined the Webber International University family during the summer of 2011. A traditional Liberal Arts university, students at St. Andrews major in a wide variety of fields. Each Webber campus is a traditional residential campus and features a wide array of extra-curricular activities. While most of our students are traditional undergraduates who attend classes in person, all day, play their sport all afternoon and retire to our dorms for the evening, we also offer accelerated adult completion, evening MBA, and completely online degrees. We are a results-oriented organization that expects people to meet their goals and understand that this requires hard work. However, we are a collegial, friendly workplace. We have an open-door policy. We know each other. We know our students |
Scraped Date | 2024-02-26T16:02:38.640Z |
Encrypted Date | 20/01/2024 |
Company Revenue | $9 Million |
Employee Count | 128 |
Amount of Files | about 65b |
Disclosure Status | EVIDENCE |
Disclosure Date | DEPENDS ON YOU |
Evidence Pack Downloadable | YES |
Full Data Dump Downloadable | NO |
Additional Information | N/A |
Number of Dark Web Post Views (at the time of scraping) | 14 |
The use of any indicators of compromise (IOCs) or information obtained through cybersecurity research for any purpose other than cybersecurity is not condoned by HookPhish. Any links or references to anything potentially sensitive are being shared for cybersecurity purposes only and are not intended to promote or facilitate any illegal activities. Always consider the potential legal and ethical implications of your actions utilising this information.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.
RansomHouse Ransomware Group
The ‘RansomHouse’ group is a data-extortion cybercrime operation that emerged in December 2021. Unlike traditional ransomware groups, RansomHouse claims not to use ransomware and instead focuses on breaching networks through their own tools. The group employs a double-extortion model, exfiltrating data and threatening to publish it if ransom demands are not met. RansomHouse has been associated with high-profile attacks, with victims listed on its data leak site, and has targeted various organizations, including a German airline support service provider and Canada’s Saskatchewan Liquor and Gaming Authority (SLGA).
Citations:
- [1] https://bleepingcomputer.com/news/security/new-ransomhouse-group-sets-up-extortion-market-adds-first-victims/
- [2] https://techtarget.com/searchsecurity/news/366563096/How-ransomware-gangs-are-engaging-and-using-the-media
- [3] https://globalinitiative.net/analysis/conti-ransomware-group-cybercrime/
- [4] https://hhs.gov/sites/default/files/8base-ransomware-analyst-note.pdf
- [5] https://techcrunch.com/2022/06/28/amd-extortion-ransomhouse/
Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any files or stolen information. Any legal concerns regarding the content should be directed at the attackers, not HookPhish. This blog is dedicated to posting editorial news, alerting readers about companies falling victim to ransomware attacks. HookPhish has no affiliation with ransomware threat actors or groups, and it does not host infringing content. The information on this page is automatically generated and redacted, sourced directly from the Onion Dark Web Tor Blogs pages.