Back to Threat Groups

ctblocker

ACTIVE

ransomware group

aka Critroni <br/>CTB‑Locker emerged in mid‑2014, introducing a new era of ransomware by leveraging elliptic curve cryptography (ECC), Tor-based C&C communication, and Bitcoin payments—earning its name from “Curve-Tor-Bitcoin Locker.” It was packaged and sold as a ransomware kit for approximately $1,500–$3,000, allowing affiliates to deploy customized campaigns. The malware encrypts user data (including network and removable drives), changes desktop wallpapers, and appends file extensions like .CTBL, .CTB2, or randomized strings. Victims receive instructions for payment, typically within a limited timeframe, or risk permanent data loss. In 2015–2017, law enforcement and cybersecurity firms (including McAfee and Kaspersky) disrupted the network, arrested operators, and facilitated decryption tools.

Victims

0

First Seen

Dec 9, 2024

Last Active

Apr 13, 2026

Victims (0)

No victims recorded

Infrastructure

leak site
OFFLINE
http://ohmva4gbywokzqso.onion/

never crawled

leak site
OFFLINE
http://tmc2ybfqzgkaeilm.onion

never crawled