Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Tor hidden services for GandCrab and jokeroo "vendor"

0
Low
Published: Thu Apr 04 2019 (04/04/2019, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: misp-galaxy
Product: malpedia

Description

Tor hidden services for GandCrab and jokeroo "vendor"

AI-Powered Analysis

AILast updated: 07/02/2025, 10:13:24 UTC

Technical Analysis

This threat concerns the use of Tor hidden services associated with the GandCrab and Jokeroo ransomware 'vendors'. GandCrab is a well-known ransomware family that has been widely distributed since early 2018, targeting victims by encrypting files and demanding ransom payments, often in cryptocurrency. Jokeroo is a less widely known ransomware variant but is similarly categorized as ransomware malware. The mention of Tor hidden services indicates that the operators or vendors behind these ransomware strains utilize the Tor network to host their command and control (C2) infrastructure, payment portals, or communication channels. Tor hidden services provide anonymity and resilience against takedown efforts by law enforcement or security researchers, making it harder to trace or disrupt the ransomware operations. The information is derived from CIRCL and Malpedia, with a low severity rating and no known exploits in the wild specifically tied to this Tor infrastructure. The threat level and analysis scores suggest moderate concern but not an immediate or critical threat. The lack of affected versions or patch links indicates this is more an intelligence report on infrastructure used by ransomware vendors rather than a vulnerability or exploit targeting specific software versions. The OSINT certainty is moderate (50%), but confidence in analytic judgment is high, meaning the data is considered reliable though not exhaustive. Overall, this threat highlights the persistent use of anonymizing networks by ransomware operators to maintain their operations and evade detection.

Potential Impact

For European organizations, the use of Tor hidden services by GandCrab and Jokeroo ransomware vendors implies a sustained risk of ransomware infections that are difficult to disrupt at the infrastructure level. The anonymity provided by Tor complicates efforts by law enforcement and cybersecurity teams to identify and take down ransomware payment portals or C2 servers. This can lead to prolonged ransomware campaigns and increased difficulty in incident response and attribution. European organizations, especially those in sectors with high ransomware targeting such as healthcare, finance, and critical infrastructure, may face increased exposure to ransom demands and potential operational disruptions. The low severity rating suggests that this specific intelligence does not indicate an immediate new exploit or vulnerability but rather ongoing ransomware infrastructure usage. However, the persistent availability of these Tor services means ransomware operators can continue to negotiate ransoms and distribute malware with relative impunity, increasing the overall ransomware threat landscape in Europe.

Mitigation Recommendations

1. Enhance network monitoring to detect and block Tor traffic where appropriate, especially on endpoints and networks that do not require Tor access. 2. Employ advanced endpoint detection and response (EDR) solutions capable of identifying ransomware behaviors and indicators of compromise related to GandCrab and Jokeroo. 3. Maintain robust offline and tested backups to ensure recovery without paying ransom. 4. Conduct regular user awareness training focusing on phishing and social engineering tactics commonly used to deliver ransomware. 5. Collaborate with national cybersecurity centers and law enforcement to share threat intelligence and receive updates on ransomware infrastructure takedown efforts. 6. Implement strict access controls and network segmentation to limit ransomware spread if infection occurs. 7. Use threat intelligence feeds that include indicators related to GandCrab and Jokeroo to proactively block known malicious domains or IPs, including those associated with Tor hidden services. 8. Consider deploying DNS filtering and network-level controls to detect and disrupt connections to known ransomware C2 infrastructure, including Tor exit nodes where feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Threat Level
3
Analysis
2
Original Timestamp
1554458342

Threat ID: 682acdbdbbaf20d303f0bf99

Added to database: 5/19/2025, 6:20:45 AM

Last enriched: 7/2/2025, 10:13:24 AM

Last updated: 2/7/2026, 11:42:28 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats