/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Company

NetWalker

3 articles stable
Articles
3
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
3
publications

Coverage Timeline

2023-08-13
BleepingComputer 11 related

Poland arrests five people as Europol and the DOJ take down the Lolek “bulletproof” host for allegedly facilitating Netwalker ransomware and other attacks

Europol The Hacker News : Lolek Bulletproof Hosting Servers Seized, 5 Key Operators Arrested Habiba Rashid / HackRead : Feds Seize Bulletproof Hosting Service “Lolek Hosted” Jurgita Lapienytė / Cybern...

2021-01-28
Krebs on Security 5 related

US and Bulgarian authorities seize a dark web site used to publish data stolen from victims of NetWalker, which has been among the most rapacious ransomware

U.S. and Bulgarian authorities this week seized the darkweb site used by the NetWalker ransomware cybercrime group to publish data stolen from its victims.

2020-08-10
ZDNet

McAfee report: NetWalker ransomware operators have made ~$25M from ransom payments since March, putting them in the same league as Ryuk, Dharma, REvil groups

Catalin Cimpanu / ZDNet : Tweets: @philippederyck and @brianhonan Tweets: Philippe De Ryck / @philippederyck : This article shines a light on the nightmares of ransomware. Data is copied and then enc...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...