Ransomlooker monitors ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide.
Cybernews presented Ransomlooker, a tool to monitor ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide.
The researchers have created the tool to help cybersecurity experts in their daily jobs by providing real-time updates and actionable insights. It offers various statistical insights into data, the ability to determine attack perpetrators, and incorporates filtering by country, industries, time span, and other parameters for journalistic investigations.
- It’s free of charge
- The tool uses algorithms for continuous monitoring and analysis
- This tool updates information at the same hour as new victims are leaked
- The data is always fresh and carefully curated by the security and research team to ensure the utmost quality
- It is designed for accessibility and ease of use for all
With a broad range of knowledge in various cyber security topics, the experienced Cybernews researchers team can give detailed comments on ransomware attacks and analyze different threat actors’ activities in-depth.
“Our ransomware monitoring tool, Ransomlooker, employs advanced algorithms to track and analyze ransomware groups’ activities continuously. It constantly scans the dark web and other hidden corners of the internet where ransomware operators tend to operate, identifying new extortion sites and monitoring their claims. By aggregating and consolidating this data, Ransomlooker provides real-time updates and actionable insights to its users, helping them stay one step ahead of potential threats.” reads the announcement. “With Ransomlooker, you can proactively safeguard your business or personal data from ransomware attacks. Our tool ensures you are promptly informed about emerging ransomware campaigns and the tactics used by attackers. By staying vigilant and informed, you can take timely measures to protect your systems and data, reducing the risk of falling victim to ransomware.”
[SecurityAffairs / 10.12.]