La Piovra

parsing : enabled

Urls
Screen
http://et22fibzuzfyzgurm35sttm52qbzvdgzy5qhzy46a3gmkrrht3lec5ad.onion/
Screen
http://h3txev6jev7rcm6p2qkxn2vctybi4dvochr3inymzgif53n2j2oqviqd.onion/
Screen
http://wx3djgl4cacl6y4x7r4e4mbqrrub24ectue7ixyix2du25nfowtvfiyd.onion
Screen
File servers
Screen

Posts

Date Title Description Screen
2023-06-09
Hello world! Hello fellow criminals. This is MrMantle with a new gig, representing a new ransomware cartel, that we like to call “La Piovra Ransomware”. On this blog, we will post data stolen from the hacked victims, that believe that mere backups will protect them from us! ha ha ha! If you want to join us, tox me at 9B031A59525F2F7DF4200CE5CC9476AFCA0CC50C589E0AB25C1362CEB72FAE128F3AA120EA50 ! MrMantle
2023-06-09
MegaCorp One In case you were wondering how we did it, your entire website code is on github!!!! A look on the code, a vuln here and there, and voila, all your files are now encrypted. We will start releasing other proprietary data that we copied. You have 2 days to pay!