Loading....

Explore the Halcyon Attacks Lookout

The Halcyon Attacks Lookout (or ‘HAL’ for short) is a recent ransomware attacks watchtower, built to provide tracking of attacks, groups and their victims. Given threat actors' overarching, lucrative success from ransomware attacks, they’ve become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

Ransomware Attacks Database

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cactus
Showing 6 of 192
ManufacturingManufacturingManufacturingManufacturing
Cactus Alleges Ransomware Attack on California Manufacturing Company
Date
January 30, 2025
Ransomware group
Cactus
Location

California

USA

USA
Industry
Manufacturing
RetailRetailRetailRetail
Cactus Alleges Ransomware Attack on California Retail Company
Date
January 30, 2025
Ransomware group
Cactus
Location

California

USA

USA
Industry
Retail
TransportationTransportationTransportationTransportation
Cactus Alleges Ransomware Attack on Texas Transportation Company
Date
January 30, 2025
Ransomware group
Cactus
Location

Texas

USA

USA
Industry
Transportation
RetailRetailRetailRetail
Cactus Alleges Ransomware Attack on California Retail Company
Date
January 30, 2025
Ransomware group
Cactus
Location

California

USA

USA
Industry
Retail
RetailRetailRetailRetail
Cactus Alleges Ransomware Attack on Maryland Retail Company
Date
January 30, 2025
Ransomware group
Cactus
Location

Maryland

USA

USA
Industry
Retail
ManufacturingManufacturingManufacturingManufacturing
Cactus Alleges Ransomware Attack on Manufacturing Company
Date
January 30, 2025
Ransomware group
Cactus
Location

Canada

Canada
Industry
Manufacturing

Disclaimer

The Halcyon Attacks Lookout Database is compiled using publicly available information based on the hosting choices of real-world threat actors and data from a variety of trackers. This information is provided in accordance with principles of fair use. Halcyon has made reasonable efforts to sanitize and verify the data; however, we do not guarantee the accuracy, completeness, or reliability of the information provided. Updates to the database are made as new source data becomes available from reputable sources.  By accessing, viewing, or using the information within the Halcyon Attacks Lookout Database, you acknowledge and agree to do so entirely at your own risk. No reliance should be placed upon the information for decision-making, and Halcyon disclaims all liability for any inaccuracies or omissions in the data.

Ready to Get Resilient Against Ransomware?

An endpoint resiliency platform is a critical part of a strong security strategy to protect your business and continuity. Setup a meeting to learn more with a Halcyon expert today.

Request removal

To submit a takedown request, please provide a clear identification of the content in question, including the URL(s) or page title, along with a brief description of what should be removed or revised. Clarify your relationship to the content in question. State the reason for your request, such as inaccuracy, privacy violation, intellectual property infringement, or defamation, and provide any supporting evidence. Include your full name, position (if relevant), and preferred contact details.

While Halcyon will comply with valid takedown requests, please note that our reporting conforms to fair use principles, and all information is sourced from publicly available data leak aggregator websites and public news sources.

Submit your request to [insert email] with the subject line: “Takedown Request – [Content/Entity Name].”Input the contact email where you would like the request to go to.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.