joshhighet / ransomwatch

the transparent ransomware claim tracker 🥷🏼🧅🖥️
https://ransomwatch.telemetry.ltd
The Unlicense
924 stars 141 forks source link

Question: obtaining evidence #74

Closed SecT0uch closed 1 year ago

SecT0uch commented 1 year ago

We are a "Group DIS" customer and it seems data leaks occurred the 15/05/2023 and 17/05/2023 via alphv website.

We suspect the company not being transparent, they claim no data leak occurred. I can't find any document linked to group DIS on alphv website, but we suspect the leak did occur and the ransom was paid afterwards, so the data has been removed.

I'm unfortunately discovering ransomwatch only now and was not running it to get evidences.

Is there any chance we can still get a proof of the leak ?

The only document I find is a copy of the webpage, that's calling a javascript. So we have no useful information.

We can of course prove our legitimacy.

Great project BTW! :)

Edit: Also available via jordan@sect0uch.world

maiqueg commented 1 year ago

Just sent you an email with the information that I found

ryandarby commented 1 year ago

@SecT0uch the API response to the javascript calls appear to be saved in a different file, at alphvmmm27o3a... commit history. You may be able to find an entry in the commit history there. hopefully maiqueg has also found something for you