#Securotrop

2026-01-13
2025-12-22

New post from #Securotrop : Spartan Carbide
More at : ransomlook.io/group/Securotrop #Ransomware

2025-12-18

๐Ÿ“ข SuspectFile interviewe Securotrop, jeune groupe de ransomware
๐Ÿ“ Source: SuspectFile.com โ€” Le mรฉdia annonce avoir conduit en aoรปt 2025 sa premiรจre interview avec Securotrop, dรฉcrit comme un...
๐Ÿ“– cyberveille : cyberveille.ch/posts/2025-12-1
๐ŸŒ source : suspectfile.com/securotrop-fro
#Securotrop #cybercriminalitรฉ #Cyberveille

2025-12-18

๐’๐ž๐œ๐ฎ๐ซ๐จ๐ญ๐ซ๐จ๐ฉ: ๐Ÿ๐ซ๐จ๐ฆ ๐š๐Ÿ๐Ÿ๐ข๐ฅ๐ข๐š๐ญ๐ข๐จ๐ง ๐ญ๐จ ๐ข๐ง๐๐ž๐ฉ๐ž๐ง๐๐ž๐ง๐œ๐ž, ๐ญ๐ก๐ž ๐ž๐ฏ๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐š ๐ฒ๐จ๐ฎ๐ง๐  ๐ซ๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž ๐ ๐ซ๐จ๐ฎ๐ฉ

This updated interview provides a direct look at Securotropโ€™s current modus operandi, the technological innovations of their proprietary ransomware, and the strategic choices that have allowed the group to consolidate itself as an independent actor.

suspectfile.com/securotrop-fro

#Interview #Qilin #RaaS #Ransomware #Securotrop

2025-12-08

New post from #Securotrop : Cadman Power Equipment
More at : ransomlook.io/group/Securotrop #Ransomware

2025-12-03

New post from #Securotrop : Delta Coast Consultants
More at : ransomlook.io/group/Securotrop #Ransomware

2025-11-08

New post from #Securotrop : Pocatello Ready Mix
More at : ransomlook.io/group/Securotrop #Ransomware

2025-11-05

Superior Air Parts and Superior Aerospace: the Securotrop attack and the data leak exposing sensitive employee and customer information

In response to questions sent by SuspectFile.com, Securotrop provided clarification about the attack. According to the group, all systems of the company were encrypted, โ€œlimited to the U.S. network.โ€

suspectfile.com/superior-air-p

#Superior_Air_Parts #Superior_Aerospace #Ransomware #Securotrop #Infosec

2025-10-22

New post from #Securotrop : Superior Air Parts
More at : ransomlook.io/group/Securotrop #Ransomware

2025-10-18

๐–๐ก๐ฒ ๐€๐ฅ๐ฅ๐š๐ซ๐๐ฒ๐œ๐ž ๐๐จ๐ฐ๐ž๐ซ ๐‚๐จ๐ง๐ฌ๐ฎ๐ฅ๐ญ๐ข๐ง๐ โ€™๐ฌ ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž ๐ˆ๐ง๐ฌ๐ฎ๐ซ๐š๐ง๐œ๐ž ๐ƒ๐ข๐๐งโ€™๐ญ ๐–๐จ๐ซ๐ค ๐š๐ฌ ๐„๐ฑ๐ฉ๐ž๐œ๐ญ๐ž๐

ABC held a cyber insurance policy with #Coalition, which covered ransomware attacks up to five million Canadian dollars.
The policy was technically activated when ABC notified Coalition of the attack, yet it was never fully implemented โ€” most notably, the ransom demand was not paid.
It remains unclear whether Coalition also declined to cover related expenses such as legal or consulting support, but several indicators suggest a prudential stance by the insurer.

The inevitable question is: why?

suspectfile.com/why-allardyce-

#Infosec #Ransomware #Data_Breach #Insurance #ABC #Securotrop

2025-10-16

๐€๐ฅ๐ฅ๐š๐ซ๐๐ฒ๐œ๐ž ๐๐จ๐ฐ๐ž๐ซ ๐‚๐จ๐ง๐ฌ๐ฎ๐ฅ๐ญ๐ข๐ง๐  ๐๐š๐ญ๐š ๐›๐ซ๐ž๐š๐œ๐ก: ๐œ๐ฒ๐›๐ž๐ซ ๐ข๐ง๐ฌ๐ฎ๐ซ๐š๐ง๐œ๐ž ๐ง๐จ๐ญ ๐š๐œ๐ญ๐ข๐ฏ๐š๐ญ๐ž๐, ๐ซ๐ž๐š๐ฌ๐จ๐ง๐ฌ ๐ซ๐ž๐ฆ๐š๐ข๐ง ๐ฎ๐ง๐œ๐ฅ๐ž๐š๐ซ

According to information gathered by SuspectFile.com, the incident occurred in the early days of September 2025. The attack reportedly resulted in the encryption of company servers and the exfiltration of a significant volume of data, estimated at nearly 3 TB. According to Securotropโ€™s blog, the total number of files published would be nearly 1.4 million, highlighting the sheer scale of the breach.

suspectfile.com/allardyce-bowe

#Infosec #Ransomware #Data_Breach #ABC #Securotrop

2025-10-10

New post from #Securotrop : Churchill Claims Services
More at : ransomlook.io/group/Securotrop #Ransomware

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst