Report an incident

Get 24/7 incident response assistance from our global team

  • APAC: +65 3159 4398
  • EU & NA: +31 20 890 55 59
  • MEA: +971 4 540 6400
Talk to sales

Just fill out the form, and our representative will contact you soon.

Join the Cybercrime Fighters Club

Please review the following rules before submitting your application:

1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.

2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.

Cyber Security Services - Group-IB logo
  • Products
    The Unified Risk Platform
    The Unified Risk Platform

    Prevent breaches, fraud, and brand abuse with intelligence-driven solutions powered by a single platform

    The Unified Risk Platform
    Integrations

    Enhance your portfolio by integrating Group-IB solutions

    Products
    • Threat Intelligence

      Threat Intelligence

    • Attack Surface Management

      Attack Surface Management

    • Fraud Protection

      Fraud Protection

    • Digital risk protection

      Digital Risk Protection

    • Managed XDR

      Managed XDR

    • Business Email Protection

      Business Email Protection

    Free Tools
    • Email Protection Audit Program

      Email Protection Audit Program

    • Malware Reports

      Malware Reports

    • Messages and Files Encryption

      Messages and Files Encryption

    • Network Protection Assessment

      Network Protection Assessment

    Integrations

    Enhance your portfolio by integrating Group-IB solutions

    Learn more
    Integrations
  • Services
    Adjust your security architecture
    Services Retainer

    From emergency support to strategic resilience in one agreement

    Learn more
    Assessment
    • Incident Response Readiness Assessment
    • Penetration Testing
    • Vulnerability Assessment
    • Red Teaming
    • Compromise Assessment
    • SOC Consulting
    • AI Red Teaming
    • Tabletop Exercises
    Response
    • Incident Response
    • Incident Response Retainer
    • Digital Forensics
    Training
    • Training for Technical Specialists
    • Management Master-Сlasses
    • All Training Programs
    Hi-Tech Crime Investigation
    • Cyber Investigation
    • Investigation Subscription
  • Solutions
    Solutions by Role
    • CISO
    • Head of Fraud
    • Head of Brand Protection
    • Head of Threat Intelligence
    • SOC Manager
    • Security Analyst
    Solutions by Use Case
    • Data Leak Detection
    • Ransomware Protection
    • Phishing and Scam Protection
    • Bot Protection
    • Business Email Protection
    • Anti-Piracy
    • Dark Web and Deep Web Monitoring
    • Building CTI Program
    • Vulnerability Management
    Solutions by Industry
    • Law Enforcement
    • Regulatory Compliance
    • Retail and e-Commerce
    • Crypto Industry
    • Governments
    • Telecom and Service Providers
    • Online Gambling and Betting
    • Financial Services
    • Insurance Sector
    • OT/ICS Cybersecurity
    • Manufacturing Industry
    • Small and Medium Business
    • Oil and Gas
    Solutions by Role
    • CISO
    • Head of Fraud
    • Head of Brand Protection
    • Head of Threat Intelligence
    • SOC Manager
    • Security Analyst
    Outrunning ransomware
    Outrunning ransomware

    Ransomware spreads quickly across networks, exploiting vulnerabiliti...

    Explore solutions
    Dealing with sensitive data exfiltration
    Data Leaks

    Implement proven secure data practices along with a comprehen...

    Explore solutions
    Stay vigilant against adversaries
    Dark Web Monitoring

    Effectively safeguard your business assets against unseen risks...

    Explore solutions
  • Subscription Plans
  • Resources
    The world of cybersecurity in one place
    The world of cybersecurity
    in one place

    Discover our resource center

    Discover our resource center
    • Research Hub
    • Success Stories
    • Knowledge Hub
    • Certificates
    • Webinars
    • Podcasts
    • Top Investigations
    • Ransomware Notes
    • Cybercrime Fighters Club
    Operationalize Threat Intelligence
    Operationalize Threat Intelligence

    Your All-Hands E-Book On Operationalizing Cyber Threat Intelligence (CTI)

    Learn more
  • Blog
  • Company
    • About Group-IB
    • Team
    • CERT-GIB
    • Careers
    • Internship
    • Sustainability
    • Media Center
    • Contact
  • Partners
    • Partner Program
    • MSSP and MDR Partner Program
    • Technology Partners
    • Partner Locator
  • Subscription Plans
  • Blog
  • Report an incident
  • Talk to sales
  • Sign in
Join us in social media
Subscribe to stay up to date with the latest cyber threat trends
Group-IB on Twitter Group-IB on LinkedIn Group-IB on Instagram Group-IB on Facebook Group-IB on Telegram Group-IB on Discord

Pietro Albuquerque

Cyber Threat Intelligence Analyst (LATAM)

Blog posts by Pietro Albuquerque

Ransomware
April 30, 2025
Ransomware debris: an analysis of the RansomHub operation
This blog on RansomHub provides an overview into how this Ransomware-as-a-Service (RaaS) group operates, including its extortion tactics, affiliate recruitment strategies, and the features of its affiliate panel.
8,440
Ransomware
April 2, 2025
The beginning of the end: the story of Hunters International
Learn about technical details on the ransomware and Storage Software tool, how the criminals use the affiliate panel as well as information on the Hunters International ransomware group from its emergence to the end of the operation.
6,725
RansomHub Never Sleeps Episode 1
Ransomware
February 12, 2025
RansomHub Never Sleeps Episode 1: The evolution of modern ransomware
Discover how ransomware has evolved into a sophisticated cyber threat, with groups like RansomHub leading the charge. Learn more about their adaptability, TTPs, and the rise of Ransomware-as-a-service in this first-of-three-part trilogy.
4,672
Ransomware
January 28, 2025
Cat’s out of the bag: Lynx Ransomware-as-a-Service
In this blog, we observed how the Lynx Ransomware-as-a-Service (RaaS) group operates, detailing the workflow of their affiliates within the panel, their cross-platform ransomware arsenal, customizable encryption modes, and advanced technical capabilities.
18,906
Load More
Cyber Security Services - Group-IB logo
Scroll to top
Resources
  • Research Hub
  • Success Stories
  • Knowledge Hub
  • Certificates
  • Webinars
  • Podcasts
  • TOP Investigations
  • Ransomware Notes
Products
  • Threat Intelligence
  • Fraud Protection
  • Managed XDR
  • Attack Surface Management
  • Digital Risk Protection
  • Business Email Protection
  • Unified Risk Platform
  • Integrations
Partners
  • Partner Program
  • MSSP and MDR Partner Program
  • Technology Partners
  • Partner Locator
Company
  • About Group-IB
  • Team
  • CERT-GIB
  • Careers
  • Internship
  • Sustainability
  • Media Center
  • Contact
Subscription plans
Services
Resource Center
Subscribe to stay up to date with the latest cyber threat trends
Contact
  • APAC: +65 3159 3798
  • EU & NA: +31 20 226 90 90
  • MEA: +971 4 568 1785
info@group-ib.com
  • Group-IB on Twitter
  • Group-IB on LinkedIn
  • Group-IB on Instagram
  • Group-IB on Facebook
  • Group-IB on Telegram
  • Group-IB on Discord

© 2003 – 2025 Group-IB is a global leader in the fight against cybercrime, protecting customers around the world by preventing breaches, eliminating fraud and protecting brands.

  • Terms of Use
  • Cookie Policy
  • Privacy Policy