RansomLook is tool to monitor Ransomware groups and markets and extract their victims.
- Based on ransomwatch https://github.com/joshhighet/ransomwatch,
- Important changes have been done:
- All data are stored into valkey
- Scraping is multithreaded
- Scraping is done with PlayWright and screenshots are taken at the same time
- Parsers are now using BeautilfulSoup and are independant
- If you create a local account, you will be able to add/edit/delete groups using the web interface
- All website is done using Flask so no need to regenerate any MD file
- Mail alerting for posts containing your keywords
- Important changes have been done:
- Details about the groups with data from malpedia.
- Daily notification by email.
- Notification on RocketChat when a new post is created.
- Telegram monitoring
- Dataleak monitoring
- Monitoring Cryptocurrencies, data are from: https://ransomwhe.re
- MISP integration with the support of the MISP ransomware galaxy
- Ransomnotes, from ThreatLabs (@Threatlabz)
Note that is is strongly recommended to use Ubuntu 22.04.
You need poetry installed, see the install guide.
Valkey: Valkey is an open source (BSD) high-performance key/value datastore that supports a variety workloads such as caching, message queues, and can act as a primary database. Valkey can run as either a standalone daemon or in a cluster, with options for replication and high availability.
NOTE: Valkey should be installed from the source, and the repository must be in the same directory as the one you will be cloning RansomLook into.
In order to compile and test Valkey, you will need a few packages:
sudo apt-get update
sudo apt install build-essential tcl
git clone https://github.com/valkey-io/valkey
cd valkey
git checkout 8.0
make
# Optionally, you can run the tests:
make test
cd ..
Do the usual:
git clone https://github.com/RansomLook/RansomLook.git
And at this point, you should be in a directory that contains valkey
and RansomLook
.
Make sure it is the case by running ls valkey RansomLook
. If you see No such file or directory
,
one of them is missing and you need to fix the installation.
The directory tree must look like that:
.
├── valkey => compiled valkey
└── RansomLook => not installed RansomLook yet
sudo apt install python3-dev
sudo apt install libnss3 libnspr4 libatk1.0-0 libatk-bridge2.0-0 libcups2 libxkbcommon0 libxdamage1 libgbm1 libpango-1.0-0 libcairo2 libatspi2.0-0 libxcomposite1 libxfixes3 libxrandr2 libasound2 libwayland-client0
sudo apt install libgtk-3-0 libpangocairo-1.0-0 libcairo-gobject2 libgdk-pixbuf2.0-0 libx11-xcb1 libxcursor1
sudo apt install tor ffmpeg
From the directory you cloned RansomLook to, run:
cd RansomLook # if you're not already in the directory
poetry install
Initialize the .env
file:
echo RANSOMLOOK_HOME="`pwd`" >> .env
Get web dependencies (css, font, js)
poetry run tools/3rdparty.py
poetry run tools/generate_sri.py
Be aware that those are version-constrained because SubResource Integrity (SRI) is used (set in website/web/sri.txt).
Copy the config file:
cp config/generic.json.sample config/generic.json
And configure it accordingly to your needs.
Run the following command to fetch the required javascript deps and run RansomLook.
poetry run update --yes
With the default configuration, you can access the web interface on http://0.0.0.0:8000
.
Start the tool (as usual, from the directory):
poetry run start
You can stop it with
poetry run stop
With the default configuration, you can access the web interface on http://127.0.0.1:8000
.
Import data from the main instance 'https://www.ransomlook.io'
This command will copy the DB of the official instance.
poetry run tools/import_from_instance.py
poetry run tools/malpedia.py
poetry run add GROUPNAME URLTOCHECK DATABASE-NUMBER
NB: if a parser exists in RansomLook/parsers/ be sure that GROUPNAME is the same of the .py file
NB: DATABASE-NUMBER must be 0 or 3, depending if you are adding a Ransomware blog or a Market place.
sudo systemctl status tor # check if tor is running
sudo systemctl enable tor # active tor for next boots
sudo systemctl start tor # start tor if not running
poetry run scrape
poetry run parse
poetry run tools/breach.py
poetry run telegram
It's recommanded to create a cron job to scrape and parse all groups every 2 hours.
Copyright (C) 2022-2024 Fafner [_KeyZee_]
Copyright (C) 2022-2024 Alexandre Dulaunoy
Copyright (C) 2022-2024 CERT-AG - CERT AG
This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License along with this program. If not, see https://www.gnu.org/licenses/.