Threat Actor Profile
High Cybercriminal
Description

The 8base Ransomware group made its first appearance in early March 2022, remaining somewhat quiet after the attacks. This group operates like other ransomware actors, engaging in double extortion. However, in mid-May and June 2023, the ransomware operation saw a spike in activity against organizations from various sectors, listing 131 organizations in just 3 months. The 8base data leak site was created and made available in March 2023, claiming honesty and simplicity in its discourse. VMware published a report on 8base, drawing some similarities with the ransomware group `RansomHouse`, pointing out resemblances such as the website used by 8base and the ransom notes presented in its attacks. Interestingly, the 8base Ransomware group does not have its own ransomware developed by the group. Instead, the actors took advantage of other leaked ransomware builders to customize the ransom note and present it to the victim organization as 8base's operation. Source : https://github.com/crocodyli/ThreatActors-TTPs

Confidence Score
100%
Tags
ransomware ransomware.live
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (28)
T1005 - Data from Local System
Collection
T1056 - Input Capture
Collection
T1074 - Data Staged
Collection
T1003 - OS Credential Dumping
Credential Access
T1027 - Obfuscated Files or Information
Defense Evasion
T1027.002 - Software Packing
Defense Evasion
T1036 - Masquerading
Defense Evasion
T1070.004 - File Deletion
Defense Evasion
T1112 - Modify Registry
Defense Evasion
T1134.001 - Token Impersonation/Theft
Defense Evasion
T1202 - Indirect Command Execution
Defense Evasion
T1497 - Virtualization/Sandbox Evasion
Defense Evasion
T1562.001 - Disable or Modify Tools
Defense Evasion
T1564.001 - Hidden Files and Directories
Defense Evasion
T1057 - Process Discovery
Discovery
T1082 - System Information Discovery
Discovery
T1083 - File and Directory Discovery
Discovery
T1135 - Network Share Discovery
Discovery
T1518.001 - Security Software Discovery
Discovery
T1053 - Scheduled Task/Job
Execution
T1059 - Command and Scripting Interpreter
Execution
T1129 - Shared Modules
Execution
T1485 - Data Destruction
Impact
T1486 - Data Encrypted for Impact
Impact
T1490 - Inhibit System Recovery
Impact
T1080 - Taint Shared Content
Lateral Movement
T1547 - Boot or Logon Autostart Execution
Persistence
T1547.001 - Registry Run Keys / Startup Folder
Persistence
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'added_date': None,
 'client': '2003264@sit.singaporetech.edu.sg',
 'description': 'The 8base Ransomware group made its first appearance in early '
                'March 2022, remaining somewhat quiet after the attacks. This '
                'group operates like other ransomware actors, engaging in '
                'double extortion. <BR> However, in mid-May and June 2023, the '
                'ransomware operation saw a spike in activity against '
                'organizations from various sectors, listing 131 organizations '
                'in just 3 months.<BR> The 8base data leak site was created '
                'and made available in March 2023, claiming honesty and '
                'simplicity in its discourse.<BR> VMware published a report on '
                '8base, drawing some similarities with the ransomware group '
                '`RansomHouse`, pointing out resemblances such as the website '
                'used by 8base and the ransom notes presented in its '
                'attacks.<BR> Interestingly, the 8base Ransomware group does '
                'not have its own ransomware developed by the group. Instead, '
                'the actors took advantage of other leaked ransomware builders '
                'to customize the ransom note and present it to the victim '
                "organization as 8base's operation.<BR>Source : "
                'https://github.com/crocodyli/ThreatActors-TTPs',
 'firstseen': '2022-04-03T00:00:00+00:00',
 'group': '8base',
 'has_negotiations': False,
 'has_ransomnote': True,
 'lastseen': '2025-02-01T12:49:21.803823+00:00',
 'locations': [{'available': False,
                'fqdn': 'xb6q2aggycmlcrjtbjendcnnwpmmwbosqaugxsqb4nx6cmod3emy7sad.onion',
                'slug': 'http://xb6q2aggycmlcrjtbjendcnnwpmmwbosqaugxsqb4nx6cmod3emy7sad.onion',
                'title': 'This site has been seized',
                'type': 'DLS'},
               {'available': False,
                'fqdn': 'xfycpauc22t5jsmfjcaz2oydrrrfy75zuk6chr32664bsscq4fgyaaqd.onion',
                'slug': 'http://xfycpauc22t5jsmfjcaz2oydrrrfy75zuk6chr32664bsscq4fgyaaqd.onion',
                'title': 'This site has been seized',
                'type': 'DLS'},
               {'available': False,
                'fqdn': 'basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion',
                'slug': 'http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/',
                'title': 'Home',
                'type': 'DLS'},
               {'available': False,
                'fqdn': '92.118.36.204.',
                'slug': 'http://92.118.36.204',
                'title': 'Home',
                'type': 'DLS'}],
 'negotiation_count': 0,
 'ransomnotes_count': 3,
 'tiaras_metadata': {'has_negotiations': False,
                     'has_ransomnote': True,
                     'locations': [{'available': False,
                                    'fqdn': 'xb6q2aggycmlcrjtbjendcnnwpmmwbosqaugxsqb4nx6cmod3emy7sad.onion',
                                    'slug': 'http://xb6q2aggycmlcrjtbjendcnnwpmmwbosqaugxsqb4nx6cmod3emy7sad.onion',
                                    'title': 'This site has been seized',
                                    'type': 'DLS'},
                                   {'available': False,
                                    'fqdn': 'xfycpauc22t5jsmfjcaz2oydrrrfy75zuk6chr32664bsscq4fgyaaqd.onion',
                                    'slug': 'http://xfycpauc22t5jsmfjcaz2oydrrrfy75zuk6chr32664bsscq4fgyaaqd.onion',
                                    'title': 'This site has been seized',
                                    'type': 'DLS'},
                                   {'available': False,
                                    'fqdn': 'basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion',
                                    'slug': 'http://basemmnnqwxevlymli5bs36o5ynti55xojzvn246spahniugwkff2pad.onion/',
                                    'title': 'Home',
                                    'type': 'DLS'},
                                   {'available': False,
                                    'fqdn': '92.118.36.204.',
                                    'slug': 'http://92.118.36.204',
                                    'title': 'Home',
                                    'type': 'DLS'}],
                     'negotiation_count': 0,
                     'ransomnotes_count': 3,
                     'ransomware_live_group': '8base',
                     'tools': {'CredentialTheft': ['LaZagne',
                                                   'Mimikatz',
                                                   'NirSoft VNCPassView',
                                                   'NirSoft WebBrowserPassView',
                                                   'PasswordFox',
                                                   'ProcDump'],
                               'DefenseEvasion': ['GMER',
                                                  'PCHunter',
                                                  'ProcessHacker'],
                               'DiscoveryEnum': [],
                               'Exfiltration': ['RClone'],
                               'LOLBAS': ['PsExec'],
                               'Networking': [],
                               'Offsec': [],
                               'RMM-Tools': []},
                     'url': 'https://www.ransomware.live/group/8base',
                     'victims': 455,
                     'vulnerabilities': []},
 'tiaras_source': 'ransomware.live',
 'tools': {'CredentialTheft': ['LaZagne',
                               'Mimikatz',
                               'NirSoft VNCPassView',
                               'NirSoft WebBrowserPassView',
                               'PasswordFox',
                               'ProcDump'],
           'DefenseEvasion': ['GMER', 'PCHunter', 'ProcessHacker'],
           'DiscoveryEnum': [],
           'Exfiltration': ['RClone'],
           'LOLBAS': ['PsExec'],
           'Networking': [],
           'Offsec': [],
           'RMM-Tools': []},
 'ttps': [{'tactic_id': 'TA0002',
           'tactic_name': 'Execution',
           'techniques': [{'technique_id': 'T1053',
                           'technique_name': 'Scheduled Task/Job'},
                          {'technique_id': 'T1059',
                           'technique_name': 'Command and Scripting '
                                             'Interpreter'},
                          {'technique_id': 'T1129',
                           'technique_name': 'Shared Modules'}]},
          {'tactic_id': 'TA0003',
           'tactic_name': 'Persistence',
           'techniques': [{'technique_id': 'T1053',
                           'technique_name': 'Scheduled Task/Job'},
                          {'technique_id': 'T1547',
                           'technique_name': 'Boot or Logon Autostart '
                                             'Execution'},
                          {'technique_id': 'T1547.001',
                           'technique_name': 'Registry Run Keys/Startup '
                                             'Folder'}]},
          {'tactic_id': 'TA0004',
           'tactic_name': 'Privilege Escalation',
           'techniques': [{'technique_id': 'T1053',
                           'technique_name': 'Scheduled Task/Job'},
                          {'technique_id': 'T1547',
                           'technique_name': 'Boot or Logon Autostart '
                                             'Execution'},
                          {'technique_id': 'T1547.001',
                           'technique_name': 'Registry Run Keys/Startup Files'},
                          {'technique_id': 'T1134.001',
                           'technique_name': 'Token Impersonation/Theft'}]},
          {'tactic_id': 'TA0005',
           'tactic_name': 'Defense Evasion',
           'techniques': [{'technique_id': 'T1027',
                           'technique_name': 'Obfuscated Files or Information'},
                          {'technique_id': 'T1112',
                           'technique_name': 'Modify Registry'},
                          {'technique_id': 'T1202',
                           'technique_name': 'Indirect Command Execution'},
                          {'technique_id': 'T1027.002',
                           'technique_name': 'Software Packing'},
                          {'technique_id': 'T1036',
                           'technique_name': 'Masquerading'},
                          {'technique_id': 'T1564.001',
                           'technique_name': 'Hidden Files and Directories'},
                          {'technique_id': 'T1070.004',
                           'technique_name': 'File Deletion'},
                          {'technique_id': 'T1497',
                           'technique_name': 'Virtualization/Sandbox Evasion'},
                          {'technique_id': 'T1562.001',
                           'technique_name': 'Disable or Modify Tools'}]},
          {'tactic_id': 'TA0006',
           'tactic_name': 'Credential Access',
           'techniques': [{'technique_id': 'T1003',
                           'technique_name': 'OS Credential Dumping'},
                          {'technique_id': 'T1056',
                           'technique_name': 'Input Capture'}]},
          {'tactic_id': 'TA0007',
           'tactic_name': 'Discovery',
           'techniques': [{'technique_id': 'T1057',
                           'technique_name': 'Process Discovery'},
                          {'technique_id': 'T1135',
                           'technique_name': 'Network Share Discovery'},
                          {'technique_id': 'T1082',
                           'technique_name': 'System Information Discovery'},
                          {'technique_id': 'T1083',
                           'technique_name': 'File and Directory Discovery'},
                          {'technique_id': 'T1497',
                           'technique_name': 'Virtualization/Sandbox Evasion'},
                          {'technique_id': 'T1518.001',
                           'technique_name': 'Security Software Discovery'}]},
          {'tactic_id': 'TA0008',
           'tactic_name': 'Lateral Movement',
           'techniques': [{'technique_id': 'T1080',
                           'technique_name': 'Taint Shared Content'}]},
          {'tactic_id': 'TA0009',
           'tactic_name': 'Collection',
           'techniques': [{'technique_id': 'T1005',
                           'technique_name': 'Data from Local System'},
                          {'technique_id': 'T1074',
                           'technique_name': 'Data Staged'},
                          {'technique_id': 'T1056',
                           'technique_name': 'Input Capture'}]},
          {'tactic_id': 'TA0040',
           'tactic_name': 'Impact',
           'techniques': [{'technique_id': 'T1490',
                           'technique_name': 'Inhibit System Recovery'},
                          {'technique_id': 'T1486',
                           'technique_name': 'Data Encrypted for Impact'},
                          {'technique_id': 'T1485',
                           'technique_name': 'Data Destruction'}]}],
 'url': 'https://www.ransomware.live/group/8base',
 'victims': 455,
 'vulnerabilities': []}
Quick Actions
Related TTPs (28)
Data from Local System
Collection

Input Capture
Collection

Data Staged
Collection

OS Credential Dumping
Credential Access

Obfuscated Files or Informati…
Defense Evasion