BY flag  4 Ransomware victims from Belarus


Sponsored by Hudson RockUse Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business


Region: Europe

Capital: Minsk

Population: 9,475,100

2 CERTs/CSIRTs found


This page lists all the victims of ransomware attacks in Ransomware.live database for Belarus. We continously scrape ransomware group site to detect new victims.
BY flag

avtovelomoto.by 

Company logo
Ransomware Group:

Discovery Date: 2025-02-12 15:23

Sector: Not Found
[AI generated] Avtovelomoto.by is a leading automotive and motorcycle retail company based in Belarus. They offer an extensive range of products including spare parts, motorcycles, bicycles, ATV's, snowmobiles, as well as accessories and equipment for these vehicles. Their diverse product range caters to both amateur and professional enthusiasts. They pride themselves in providing high quality products, customer-friendly services, and competitive pricing.

Victim:   |  Group: 
BY flag

cmr24 

Company logo
Ransomware Group:

Discovery Date: 2025-02-08 01:08

Sector: Not Found
Data Size: 5GB, Status: Leaked, Data Type: Account statements and payment checks A list of delinquent customers with their data, Includes invoices, operational reports, and logistical document

Victim:   |  Group: 
BY flag

shintex.by 

Company logo
Ransomware Group:

Discovery Date: 2024-12-15 09:55
Estimated Attack Date: 2024-11-30

👈 **Oops, all the files have been deleted ****🔥**** [+] Shintekhsnab specializes in selling tires, batteries, and accessories for vehicles, including trucks, cars, and agricultural equipment. [+] ****shintex.by**** Dragons ****🌟****.**

Victim:   |  Group: 
BY flag

atriline.by 

Company logo
Ransomware Group:

Discovery Date: 2024-04-25 22:26

Sector: Technology
Онлайн продажа билетов по маршруту Бобруйск - Минск - Бобруйск ⭐️ Покупка занимает 2 минуты ⭐️ Ознакомьтесь с рассписанием и ценами ️️⭐️ Бесплатный возврат, удобное приложение для телефона, sms оповещение.

Victim:   |  Group: