Loading....

Explore the Halcyon Attacks Lookout

The Halcyon Attacks Lookout (or ‘HAL’ for short) is a recent ransomware attacks watchtower, built to provide tracking of attacks, groups and their victims. Given threat actors' overarching, lucrative success from ransomware attacks, they’ve become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

NEW
December 23, 2024

According to the Power Rankings: Ransomware Malicious Quartile report, Black Basta is believed to be an offshoot of the now-defunct Conti and REvil cybercrime gangs...

NEW
December 23, 2024

LockBit, despite significant law enforcement actions in early 2024, is poised to return with its fourth iteration, LockBit 4.0, set to launch on February 3, 2025...

NEW
December 19, 2024

Patients already grappling with healthcare issues are now facing the horrifying prospect that their most private and sensitive information could be publicly exposed unless a ransom is paid...

NEW
December 19, 2024

Halcyon publishes a quarterly RaaS and data extortion group reference guide, Power Rankings: Ransomware Malicious Quartile. Here's the ransomware gangs on the move last week: Funksec, 8Base, Black Basta, and RansomHub...

NEW
December 18, 2024

It is increasingly untenable to leave individual organizations—many of which lack the resources or expertise—to fend for themselves against highly sophisticated adversaries...

NEW
December 17, 2024

There is speculations that Lynx is a rebranding of INC ransomware, as the similarity in their source code strongly suggests that Lynx has inherited or acquired INC’s malware infrastructure...

Explore the Ransomware Attacks Database

Dive into each Attack to read the full incident details. View Attacks by Group, Industry, and Country, using filters.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100
No results found.
There are no results with this criteria. Try changing your search.

Ready to Get Resilient Against Ransomware?

An endpoint resiliency platform is a critical part of a strong security strategy to protect your business and continuity. Setup a meeting to learn more with a Halcyon expert today.

Request removal

To submit a takedown request, please provide a clear identification of the content in question, including the URL(s) or page title, along with a brief description of what should be removed or revised. Clarify your relationship to the content in question. State the reason for your request, such as inaccuracy, privacy violation, intellectual property infringement, or defamation, and provide any supporting evidence. Include your full name, position (if relevant), and preferred contact details.

While Halcyon will comply with valid takedown requests, please note that our reporting conforms to fair use principles, and all information is sourced from publicly available data leak aggregator websites and public news sources.

Submit your request to [insert email] with the subject line: “Takedown Request – [Content/Entity Name].”Input the contact email where you would like the request to go to.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.