Add scraping capability to Ragnarok site. The victims' names are shown in the form of their website based on how the threat actor displays them on the leak site. They also include the company's formal description, but since the descriptions all have different format, it would require manual parsing to extract the full company name.
Related issue(s)
New site: Ragnarok #19
How was it tested?
This was tested on Discord
Checklist for a new scraper (delete if N/A)
[X] The URL for the site is nowhere in the git history
[X] The site is added to config.sample.yaml
[X] There aren't any debug logging statements/etc.
[X] The data going into the DB is properly parsed and is accurate
Describe the changes
Add scraping capability to Ragnarok site. The victims' names are shown in the form of their website based on how the threat actor displays them on the leak site. They also include the company's formal description, but since the descriptions all have different format, it would require manual parsing to extract the full company name.
Related issue(s)
New site: Ragnarok #19
How was it tested?
This was tested on Discord
Checklist for a new scraper (delete if N/A)
config.sample.yaml