A Python tool for ransomware threat intelligence and security research.
# Install/Update from PyPI (recommended)
pip install ransomwatch
pip install --upgrade ransomwatch
# Set API token (get from ransomware.live)
export RANSOMWATCH_API_TOKEN="your-token-here"
# Use it
ransomwatch groups
ransomwatch recent -l 10
ransomwatch info --group ransomhub
ransomwatch stats| Command | Description | Example |
|---|---|---|
groups |
List active ransomware groups with risk levels | ransomwatch groups |
recent |
Show recent ransomware incidents | ransomwatch recent -l 20 |
info |
Get detailed threat actor intelligence | ransomwatch info --group akira |
stats |
Show threat landscape statistics | ransomwatch stats |
--json # JSON output for automation
--verbose # Debug logging
--timeout N # Request timeout (default: 10s)
--rate-limit-per-minute N # API rate limitingRANSOMWARE GROUP ANALYSIS
Active Groups: 271
====================================
1. [CRITICAL] lockbit3
Victim Count: 2,016
2. [CRITICAL] clop
Victim Count: 1,012
3. [CRITICAL] alphv
Alternative Name: blackcat
Victim Count: 731
4. [HIGH] play
Victim Count: 93
5. [MEDIUM] akira
Victim Count: 45
6. [LOW] chaos
Victim Count: 10
...
====================================
SUMMARY: 271 Groups | 8,234 Total Victims
RISK BREAKDOWN: Critical: 15 | High: 28 | Medium: 84 | Low: 144
RECENT RANSOMWARE INCIDENTS
Displaying: 10 most recent cases
====================================
1. VICTIM: ...
Threat Actor: lockbit3
Discovery Date: 2024-01-01 20:15
Location: United States
Website: www.example.com
Details: ...
2. VICTIM: ...
Threat Actor: alphv
Discovery Date: 2023-01-01 08:15
Location: Canada
Details: ...
...
====================================
TOTAL INCIDENTS DISPLAYED: 10
THREAT ACTOR INTELLIGENCE REPORT
====================================
PRIMARY IDENTIFIER: lockbit3
THREAT CLASSIFICATION: CRITICAL
CONFIRMED VICTIMS: 2,016
OPERATIONAL TIMELINE:
Initial Detection: 2019-09-01
Most Recent Activity: 2024-01-15
TACTICS, TECHNIQUES & PROCEDURES (TTPs):
...
====================================
# JSON output
ransomwatch --json groups > threat_groups.json
ransomwatch --json recent -l 100 > incidents.json
# Daily threat intelligence reports
DATE=$(date +%Y-%m-%d)
ransomwatch --json stats > "threat_landscape_${DATE}.json"
# Filter high-risk groups with jq
ransomwatch --json groups | jq '.groups[] | select(.victims > 100) | {name: .group, victims: .victims, threat_level: "CRITICAL"}'
# Generate reports
ransomwatch groups > daily_threat_brief.txt
ransomwatch recent -l 20 > recent_incidents.txtpip install ransomwatch
ransomwatch --helpgit clone https://github.com/yannickboog/ransomwatch.git
cd ransomwatch
pip install -e .
ransomwatch --helpgit clone https://github.com/yannickboog/ransomwatch.git
cd ransomwatch
pip install -r requirements.txt
python3 -m ransomwatch --helpgit clone https://github.com/yannickboog/ransomwatch.git
cd ransomwatch
cp .env.example .env
docker build -t ransomwatch .
docker run --env-file .env ransomwatch groups
docker compose up- Get token from ransomware.live
- Set environment variable:
cp .env.example .envEdit .env and set your API token:
RANSOMWATCH_API_TOKEN=your-actual-token-here
export RANSOMWATCH_API_TOKEN="your-token"echo 'export RANSOMWATCH_API_TOKEN="your-token"' >> ~/.bashrcCMD:
set RANSOMWATCH_API_TOKEN=your-tokenPowerShell:
$env:RANSOMWATCH_API_TOKEN = "your-token"CMD - For current user:
setx RANSOMWATCH_API_TOKEN "your-token"CMD - For all users (as Administrator):
setx RANSOMWATCH_API_TOKEN "your-token" /MPowerShell - For current user:
[Environment]::SetEnvironmentVariable("RANSOMWATCH_API_TOKEN", "your-token", "User")PowerShell - For all users (as Administrator):
[Environment]::SetEnvironmentVariable("RANSOMWATCH_API_TOKEN", "your-token", "Machine")| Error | Solution |
|---|---|
| "No API token provided" | Linux/macOS: export RANSOMWATCH_API_TOKEN="token"Windows CMD: set RANSOMWATCH_API_TOKEN=tokenWindows PowerShell: $env:RANSOMWATCH_API_TOKEN = "token" |
| "Request timed out" | ransomwatch --timeout 30 groups |
| "Invalid command" | Use: groups, recent, info, stats |
- Python 3.8+ or Docker
- API token from ransomware.live
If this tool helped you, consider supporting development:
Bitcoin: bc1qmmr6hqlqs097l4ehgyccu8aulk68hmpn3rwkn8
MIT License - see LICENSE file for details.
Source: Ransomware.live
For legitimate security research and threat intelligence purposes only.