RansomedVC and Stormous: Partnership, Rebranding, and Ecosystem Convergence
![]() |
In late 2023, a Telegram channel operating under the name Ransomed News began appearing across multiple cybercrime touchpoints. At first, it looked like many others: sharing updates, promoting activity, and attempting to attract attention within an already crowded ransomware space.
But as its activity unfolded, the channel did not remain static. Its name changed repeatedly, its messaging shifted, and its scope expanded beyond simple announcements. What initially seemed like a standalone presence began to show signs of deeper connections, both in the way it operated and in the platforms it relied on.
These changes raised a key question: was this just another short-lived rebrand, or part of something more structured?
By following its digital footprint across Telegram, dark web infrastructure, and forum activity using StealthMole, this investigation traces how a single channel evolved into something far more interconnected, revealing patterns that point toward a broader and more coordinated ecosystem.
Incident Trigger and Initial Investigation
The investigation began during a separate analysis when a Tor-based URL was identified
- pdcizqzjitsgfcgqeyhuee5u6uki6zy5slzioinlhx6xjnsw25irdgqd.onion
![]() |
Accessing this address revealed a site titled “Stormous.V4 BLOG”, which appeared to function as a public-facing platform listing multiple organizations alongside descriptions of compromised data. Although the site was no longer consistently accessible at the time of analysis, the available listings indicated a high level of activity, with victims spanning different industries and regions.
This discovery prompted further validation through StealthMole’s Dark Web Tracker. Running the same onion URL surfaced additional linked infrastructure, including:
- ransekgbpijp56bflufgxptwn5hej2rztx423v6sim2zrzz7xetnr2qd.onion
- ransubr7flrzz4did5ness4aufumhroymiuiahnruwh5dfbskoxyx2ad.onion
- kxlpsf4uua2k36quvcob3mjlguurbc3rhjkwt7thoyi52o7y6tf2wrad.onion
![]() |
Two of these domains, labeled “RanStreet,” contained structured listings with file sizes and references to downloadable data, suggesting a dedicated distribution layer. Another domain appeared to function as a login panel, indicating the possible presence of a restricted backend or affiliate interface.
![]() |
Further interaction with the primary onion address revealed an updated version of the site, identified as “Stormous V5”, along with a separate page referencing “Stormous Ransomware.”
A contact section was also identified at:
- http://pdcizqzjitsgfcgqeyhuee5u6uki6zy5slzioinlhx6xjnsw25irdgqd.onion/contact.html
This page provided a TOX-based communication method:
- C2867*******************************************CBC6
![]() |
At this stage, the findings indicated that the platform was not limited to publishing breach claims, but likely formed part of a broader operational structure involving data distribution and direct negotiation channels. This initial discovery established the foundation for deeper analysis into the infrastructure and actors connected to the Stormous ecosystem.
Infrastructure and Operational Expansion
Building on the initial discovery of the Stormous V4 blog, further analysis through StealthMole revealed that the identified onion infrastructure was not isolated, but part of a broader and layered operational setup.
In addition to the primary blog, another domain was identified, which appeared to serve as an earlier version of the same platform. Although inactive at the time of investigation, it contained multiple structured endpoints, including pages dedicated to affiliate onboarding, service access, and operational rules.
- stmxylixiz4atpmkspvhkym4xccjvpcv3v67uh3dze7xwwhtnz4faxid.onion
![]() |
These included:
- Paid access portal
- Free access entry point
- PYV (Post Your Victim) service page
- Affiliate rules and participation guidelines
- Additional portal interfaces for platform interaction
The presence of these structured pages indicates that the operation was not limited to publishing data leaks, but was designed as a service-based platform with defined user roles and onboarding flows.
Further examination of the earlier infrastructure also revealed a separate onion-based environment:
- http://secretsmt222qvdg6rcmgvx4dqqc2673yzyxjrrnabwklnn6qddyv5ad.onion/members/s*****2/
![]() |
This “SECRET” panel appeared to operate as a closed communication or coordination space, distinct from the public-facing blog and distribution layers.
Overall, the infrastructure reflects a segmented architecture composed of:
- A public leak blog for visibility
- Distribution nodes for hosting and sharing data
- Access-controlled panels for platform interaction
- A restricted environment for internal coordination
This separation of functions suggests a deliberate design, enabling the operation to manage visibility, access, and interaction across different layers without relying on a single point of exposure.
Telegram Activity and Operational Insights
To further understand how the identified infrastructure was being used operationally, associated Telegram channels were analyzed through StealthMole’s Telegram Tracker. This revealed that Telegram played a central role in communication, recruitment, and coordination across the ecosystem.
One of the key channels identified was:
- https://t.me/StmXRansomware
![]() |
StealthMole indexing showed that this channel dates back to March 2022, when it originally operated under a different handle:
- https://t.me/STORMOUSS
![]() |
This historical continuity indicates that the channel has been active for an extended period, undergoing changes in branding and structure over time while maintaining its core function.
Messages within the channel provided detailed insight into how the operation functioned. These included structured announcements outlining participation models, access tiers, and operational workflows. The platform offered two primary modes of access:
- A paid version, which provided direct access to a control panel, enabling affiliates to manage victims and conduct negotiations
- A free version, where participants operated through existing affiliates, without direct access to the platform interface
![]() |
In addition to these, a separate PYV (Post Your Victim) service was promoted, allowing external actors to submit compromised targets for publication or sale. This model required users to provide details such as the target organization, data size, and proof samples, indicating a controlled intake process rather than unrestricted submissions.
![]() |
The channel also shared structured resource lists, including:
- Blog links (multiple versions of the platform)
- Access pages for paid and free participation
- Affiliate rules and operational guidelines
- Portal interfaces for interacting with the system
Communication methods were consistently reinforced, with the reuse of a primary TOX ID, as well as references to an internal communication environment hosted on the SECRET onion panel.
- C286720F7592E5668A932F1D06EDEECBAFACB3BE369632C908F9511D072C142575BA8109CBC6
Further messages revealed operational policies governing how affiliates interacted with victims. These included:
- Requirements for verifying attacks before publication
- Conditions under which victims would be listed or removed
- Negotiation guidelines, including potential ransom adjustments based on financial assessment
- Rules preventing interference from multiple parties during negotiations
![]() |
The channel also outlined broader operational practices, including:
- Affiliate recruitment and onboarding
- Updates on program versions and structural changes
- Coordination with external partners and associated channels
- Guidance on using the platform and resolving operational issues
Overall, the Telegram activity provides a direct view into how the operation functioned in practice. Rather than serving as a simple announcement channel, it acted as a central hub where infrastructure, access, and operational rules were communicated, linking together the different components of the ecosystem into a coordinated workflow.
Channel Evolution and Ecosystem Convergence
To understand how the Stormous-linked ecosystem expanded beyond a single channel, further analysis was conducted on:
- https://t.me/StmXGhostLocker
![]() |
Unlike the previously identified channels, this one provided a longer historical view, revealing a pattern of repeated rebranding and operational shifts over time.
StealthMole tracking showed that the channel had undergone multiple name changes, including:
- Ransomed News
- Ransomed_vc / Ransomed vc
- Ransomed.vc Channel
- Ransomed News
- Ražnatović Channel
- Stormous.X Store (V3.0)
- Stm.X | GhostLocker 1.0 Service
- Stm.X | GhostLocker V2.0 Service
![]() |
These changes were not random. Early activity under the RansomedVC identity focused on recruitment, announcements, and initial breach claims. Over time, the channel expanded its scope, promoting services such as marketplaces, DDoS offerings, and partnerships with other actors.
A notable shift occurred in late 2023, when the channel began advertising a marketplace (ran*********t.com) and actively seeking partnerships with other cybercrime services, including RaaS operators and account sellers. This phase marked a transition from a single-group presence toward a broader service-oriented model.
During the same period, the channel referenced operational challenges, including the arrest of individuals linked to its administration and the removal of multiple affiliates. These messages highlighted internal strain and concerns around operational security, suggesting that the group was adapting in response to external pressure.
Following this phase, the channel underwent another identity shift, rebranding as Ražnatović Channel before eventually transitioning into the Stm.X | GhostLocker identity. Alongside this transition, the messaging became more structured, focusing on defined participation models, service tiers, and platform-based operations.
Under the Stm.X | GhostLocker branding, the channel presented a more organized framework, including:
- Tiered access models (paid and free participation)
- Defined onboarding processes
- A structured affiliate system
- Integration with existing infrastructure and communication methods
The same communication identifier, specifically the previously observed TOX ID, continued to appear across these phases, providing continuity despite the repeated rebranding.
Rather than indicating a clean break between entities, this progression suggests a gradual alignment. The channel’s transition from RansomedVC to Stm.X | GhostLocker, combined with references to Stormous infrastructure and services, points toward a convergence of operations within a shared ecosystem.
This evolution reflects a shift from a loosely organized channel into a more structured environment, where branding, services, and infrastructure became increasingly interconnected.
Affiliate Activity and Actor Linkages
Beyond infrastructure and channel activity, further analysis identified the presence of external actors interacting with and leveraging the Stormous-linked ecosystem. These actors were primarily observed on underground forums, where they promoted access, advertised data, or facilitated sales using shared infrastructure and communication methods.
One such instance was identified on DarkForums:
- Thread: https://darkforums.me/Thread-Document-Hy-Vee-Internal-Breach-2025-StormouS-X
- Username: SuperNova
![]() |
In this post, the actor explicitly described themselves as an affiliate of the Stormous group. The listing included references to previously identified onion infrastructure, directing users to access data through Tor-based links. The actor also provided a dedicated TOX ID for communication:
- 0E67D9*********************************************716
![]() |
The structure of the post followed a consistent pattern: offering a sample of compromised data, describing the nature of the breach, and indicating that the full dataset would be available for purchase or negotiation. This aligns with the broader monetization approach observed across the ecosystem.
A second instance was identified on BreachForums:
- Thread: https://breachforums.is/Thread-SELLING-We-offer-an-exclusive-access-service-to-a-one-Brazilian-university-network
- Username: crowSTM
![]() |
This actor advertised exclusive access to a university network, offering time-limited access to a single buyer. The contact details provided in the thread included:
- Email: st**************p@onionmail.org
- A TOX ID consistent with Stormous-linked communication methods
The reuse of these identifiers across different platforms suggests that the actor was operating within, or in coordination with, the same ecosystem.
In addition to forum activity, multiple email addresses were identified through StealthMole indexing and Telegram analysis:
- s******s@onionmail.org
- s******p@onionmail.org
- s*****s@protonmail.com
These addresses appeared across different contexts, including Telegram channels, forum posts, and contact listings, indicating a consistent set of communication points used within the operation.
![]() |
A separate Telegram channel was also identified, containing similar contact details and breach-related messaging. However, this channel was flagged by users as potentially unreliable or impersonating, introducing ambiguity regarding its authenticity. Despite this, the reuse of known identifiers suggests some level of connection or at minimum an attempt to leverage the Stormous brand.
- https://t.me/STORMOUS_HACKER
These findings indicate that the ecosystem is not limited to a single controlled group of operators. Instead, it includes affiliates and external actors who utilize shared infrastructure, communication channels, and branding to conduct operations and monetize access or data.
![]() |
This distributed activity model reinforces the presence of a broader network, where multiple participants operate semi-independently while remaining connected through common systems and identifiers.
Conclusion
The investigation into Stormous and its associated ecosystem reveals a coordinated yet flexible operational model built on shared infrastructure, consistent communication channels, and a distributed network of participants. Rather than functioning as a single, tightly controlled group, the ecosystem operates through a combination of core infrastructure and external actors who engage at different levels, ranging from affiliates to independent contributors.
At the center of this model is a structured platform that enables onboarding, data publication, and negotiation through clearly defined processes. The presence of tiered participation, controlled submission requirements, and dedicated communication methods indicates a system designed to manage scale while maintaining a degree of oversight.
The historical activity observed across Telegram further highlights how this ecosystem has adapted over time. Rebranding efforts, platform migrations, and shifts in messaging suggest a continuous process of adjustment, likely influenced by both operational needs and external pressures. Despite these changes, key elements, such as communication identifiers and infrastructure patterns, remain consistent, providing continuity across different phases.
Importantly, the relationship between RansomedVC and Stormous is best understood not as a direct transformation, but as a gradual alignment. The progression of the channel, combined with shared infrastructure and operational similarities, points toward a convergence within a broader ecosystem rather than a single unified entity.
Overall, these findings illustrate an operation that balances structure with adaptability, capable of maintaining coordinated activity while integrating external actors and evolving its presence across platforms.
Editorial Note
Investigations into dark web and cybercriminal ecosystems rarely present a complete or definitive picture. Identities shift, infrastructure is frequently replaced or repurposed, and relationships between actors are often fluid rather than fixed. As seen in this case, distinguishing between partnership, alignment, and direct control requires careful interpretation of available evidence rather than assumption.
This analysis, built on data surfaced through StealthMole, highlights how patterns across platforms, rather than isolated findings, can be used to trace continuity and uncover structure within an otherwise fragmented environment.
To access the unmasked report or full details, please reach out to us separately.
Contact us: support@stealthmole.com
Labels: Featured, Ransomware






































