Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
FLOCKER
ID: 99da521133d790d17e2d1083cef3675f
Crimeware
Ransomware
Spyware/Stealer
Trojan
Threat types: Ransomware, RaaS, Malware, Data Leak
Progress: 69%
Completeness: 69%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
No aliases registered.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
FLOCKER is modeled as a ransomware/extortion (RaaS) cluster linked in OSINT to the alias 'FSociety', active since at least April 2024 with a Tor-based extortion portal and public comms channels. Note that 'FLocker' is also a legacy Android screen-locker ransomware family (2015–2016), creating a naming collision risk.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1486 | Data Encrypted for Impact | TA0040 | |
| T1657 | Financial Theft | TA0040 |
|
| T1560 | Archive Collected Data | TA0009 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1059 | Command and Scripting Interpreter | TA0002 |
|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1021.002 | SMB/Windows Admin Shares | TA0008 |
|
| T1003 | OS Credential Dumping | TA0006 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.