A Python tool for ransomware threat intelligence and security research.
# Install/Update from PyPI (recommended)
pip install ransomwatch
pip install --upgrade ransomwatch
# Set API token (get from ransomware.live)
export RANSOMWATCH_API_TOKEN="your-token-here"
# Use it
ransomwatch groups
ransomwatch recent -l 10
ransomwatch info --group ransomhub
ransomwatch stats
Command | Description | Example |
---|---|---|
groups |
List active ransomware groups with risk levels | ransomwatch groups |
recent |
Show recent ransomware incidents | ransomwatch recent -l 20 |
info |
Get detailed threat actor intelligence | ransomwatch info --group akira |
stats |
Show threat landscape statistics | ransomwatch stats |
--json # JSON output for automation
--verbose # Debug logging
--timeout N # Request timeout (default: 10s)
--rate-limit-per-minute N # API rate limiting
RANSOMWARE GROUP ANALYSIS
Active Groups: 271
====================================
1. [CRITICAL] lockbit3
Victim Count: 2,016
2. [CRITICAL] clop
Victim Count: 1,012
3. [CRITICAL] alphv
Alternative Name: blackcat
Victim Count: 731
4. [HIGH] play
Victim Count: 93
5. [MEDIUM] akira
Victim Count: 45
6. [LOW] chaos
Victim Count: 10
...
====================================
SUMMARY: 271 Groups | 8,234 Total Victims
RISK BREAKDOWN: Critical: 15 | High: 28 | Medium: 84 | Low: 144
RECENT RANSOMWARE INCIDENTS
Displaying: 10 most recent cases
====================================
1. VICTIM: ...
Threat Actor: lockbit3
Discovery Date: 2024-01-01 20:15
Location: United States
Website: www.example.com
Details: ...
2. VICTIM: ...
Threat Actor: alphv
Discovery Date: 2023-01-01 08:15
Location: Canada
Details: ...
...
====================================
TOTAL INCIDENTS DISPLAYED: 10
THREAT ACTOR INTELLIGENCE REPORT
====================================
PRIMARY IDENTIFIER: lockbit3
THREAT CLASSIFICATION: CRITICAL
CONFIRMED VICTIMS: 2,016
OPERATIONAL TIMELINE:
Initial Detection: 2019-09-01
Most Recent Activity: 2024-01-15
TACTICS, TECHNIQUES & PROCEDURES (TTPs):
...
====================================
# JSON output
ransomwatch --json groups > threat_groups.json
ransomwatch --json recent -l 100 > incidents.json
# Daily threat intelligence reports
DATE=$(date +%Y-%m-%d)
ransomwatch --json stats > "threat_landscape_${DATE}.json"
# Filter high-risk groups with jq
ransomwatch --json groups | jq '.groups[] | select(.victims > 100) | {name: .group, victims: .victims, threat_level: "CRITICAL"}'
# Generate reports
ransomwatch groups > daily_threat_brief.txt
ransomwatch recent -l 20 > recent_incidents.txt
pip install ransomwatch
ransomwatch --help
git clone https://github.com/yannickboog/ransomwatch.git
cd ransomwatch
pip install -e .
ransomwatch --help
git clone https://github.com/yannickboog/ransomwatch.git
cd ransomwatch
pip install -r requirements.txt
python3 -m ransomwatch --help
- Get token from ransomware.live
- Set environment variable:
export RANSOMWATCH_API_TOKEN="your-token"
echo 'export RANSOMWATCH_API_TOKEN="your-token"' >> ~/.bashrc
CMD:
set RANSOMWATCH_API_TOKEN=your-token
PowerShell:
$env:RANSOMWATCH_API_TOKEN = "your-token"
CMD - For current user:
setx RANSOMWATCH_API_TOKEN "your-token"
CMD - For all users (as Administrator):
setx RANSOMWATCH_API_TOKEN "your-token" /M
PowerShell - For current user:
[Environment]::SetEnvironmentVariable("RANSOMWATCH_API_TOKEN", "your-token", "User")
PowerShell - For all users (as Administrator):
[Environment]::SetEnvironmentVariable("RANSOMWATCH_API_TOKEN", "your-token", "Machine")
Error | Solution |
---|---|
"No API token provided" | Linux/macOS: export RANSOMWATCH_API_TOKEN="token" Windows CMD: set RANSOMWATCH_API_TOKEN=token Windows PowerShell: $env:RANSOMWATCH_API_TOKEN = "token" |
"Request timed out" | ransomwatch --timeout 30 groups |
"Invalid command" | Use: groups , recent , info , stats |
- Python 3.8+
- API token from ransomware.live
If this tool helped you, consider supporting development:
Bitcoin: bc1qmmr6hqlqs097l4ehgyccu8aulk68hmpn3rwkn8
MIT License - see LICENSE file for details.
Source: Ransomware.live
For legitimate security research and threat intelligence purposes only.