Terrtia / RansomLook

Yet another Ransomware gang tracker

Home Page:https://www.ransomlook.io

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

RansomLook

RansomLook is tool to monitor Ransomware groups and markets and extract their victims.

Features

  • Based on ransomwatch https://github.com/joshhighet/ransomwatch,
    • Important changes have been done:
      • All data are stored into redis
      • Scraping is multithreaded
      • Scraping is done with PlayWright and screenshots are taken at the same time
      • Parsers are now using BeautilfulSoup and are independant
      • If you create a local account, you will be able to add/edit/delete groups using the web interface
      • All website is done using Flask so no need to regenerate any MD file
      • Mail alerting for posts containing your keywords
  • Details about the groups with data from malpedia.
  • Daily notification by email.
  • Notification on RocketChat when a new post is created.
  • Telegram monitoring
  • Dataleak monitoring
  • Monitoring Cryptocurrencies, data are from: https://ransomwhe.re
  • MISP integration with the support of the MISP ransomware galaxy
  • Ransomnotes, from ThreatLabs (@Threatlabz)

Install guide

Note that is is strongly recommended to use Ubuntu 22.04.

System dependencies

You need poetry installed, see the install guide.

Prerequisites

Redis

Redis: An open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.

NOTE: Redis should be installed from the source, and the repository must be in the same directory as the one you will be cloning Pandora into.

In order to compile and test redis, you will need a few packages:

sudo apt-get update
sudo apt install build-essential tcl
git clone https://github.com/redis/redis.git
cd redis
git checkout 7.0
make
# Optionally, you can run the tests:
make test
cd ..

Clone RansomLook

Do the usual:

git clone https://github.com/RansomLook/RansomLook.git

Ready to install RansomLook ?

And at this point, you should be in a directory that contains redis and RansomLook.

Make sure it is the case by running ls redis RansomLook. If you see No such file or directory, one of them is missing and you need to fix the installation.

The directory tree must look like that:

.
├── redis  => compiled redis
└── RansomLook => not installed RansomLook yet

Installation

System dependencies (requires root)

sudo apt install python3-dev
sudo apt install libnss3 libnspr4 libatk1.0-0 libatk-bridge2.0-0 libcups2 libxkbcommon0 libxdamage1 libgbm1 libpango-1.0-0 libcairo2 libatspi2.0-0 libxcomposite1 libxfixes3 libxrandr2 tor libasound2 libwayland-client0 
sudo apt install libgtk-3-0 libpangocairo-1.0-0 libcairo-gobject2 libgdk-pixbuf-2.0-0 libx11-xcb1 libxcursor1  

RansomLook installation

From the directory you cloned RansomLook to, run:

cd RansomLook  # if you're not already in the directory
poetry install

Initialize the .env file:

echo RANSOMLOOK_HOME="`pwd`" >> .env

Get web dependencies (css, font, js)

poetry run tools/3rdparty.py
poetry run tools/generate_sri.py

Be aware that those are version-constrained because SubResource Integrity (SRI) is used (set in website/web/sri.txt).

Configuration

Copy the config file:

cp config/generic.json.sample config/generic.json

And configure it accordingly to your needs.

Update and launch

Run the following command to fetch the required javascript deps and run RansomLook.

poetry run update --yes

With the default configuration, you can access the web interface on http://0.0.0.0:8000.

Usage

Start the tool (as usual, from the directory):

poetry run start

You can stop it with

poetry run stop

With the default configuration, you can access the web interface on http://127.0.0.1:8000.

Commands

Import data from the main instance 'https://www.ransomlook.io'

This command will copy the DB of the official instance.

poetry run tools/import_from_instance.py

Populate descriptions and profiles from malpedia

poetry run tools/malpedia.py

Add a group (we recommand to use the GUI in admin)

poetry run add GROUPNAME URLTOCHECK DATABASE-NUMBER

NB: if a parser exists in RansomLook/parsers/ be sure that GROUPNAME is the same of the .py file

NB: DATABASE-NUMBER must be 0 or 3, depending if you are adding a Ransomware blog or a Market place.

Scrape all groups

poetry run scrape

Parse all groups

poetry run parse

Scrape for new dataleak

poetry run tools/breach.py

Scrape and parse for Telegram messages

poetry run telegram

It's recommanded to create a cron job to scrape and parse all groups every 2 hours.

License

Copyright (C) 2022-2023 Fafner [_KeyZee_]

Copyright (C) 2022-2023 Alexandre Dulaunoy

Copyright (C) 2022-2023 CERT-AG - CERT AG

This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.

You should have received a copy of the GNU Affero General Public License along with this program. If not, see https://www.gnu.org/licenses/.

About

Yet another Ransomware gang tracker

https://www.ransomlook.io

License:GNU General Public License v3.0


Languages

Language:Python 74.4%Language:HTML 18.8%Language:CSS 6.1%Language:Dockerfile 0.4%Language:JavaScript 0.3%