Sentel Ransomeware Intelligence Engine
A live, curated view of the global ransomware landscape — who is being hit, by which group, in which country and sector, and how those campaigns are evolving over time.
Powered by Sentel's own data collection and enrichment pipeline, the Sentel Ransomeware Intelligence Engine turns raw leak-site data and open reporting into a structured analyst-ready feed.
Global Ransomeware Dashboard
See high-level statistics at a glance: total attacks, trends over the last 12 months, top targeted sectors, and active groups. Timeline analytics help you answer, "Is ransomware activity going up or down in my region or industry?"
Victim & Group-Level Intelligence
Explore detailed victim records with metadata such as group, country, sector, discovery-date, website, and more. Each ransomware group has its own profile, with associated victims, known negotiations, and activity patterns, so analysts can focus on the actors that matter the most to their organization.
AI-Enriched Case Summaries
For many incidents, Sentel automatically generates an AI-written summary that explains the breach in clear language – including what happened, likely impact, and high-level technical context. This saves analysts time when preparing reports, briefings, or management updates.
Visual Proof Via Screenshots
Where available, the engine attaches leak-site screenshots for victims, giving your team visual confirmation that data has been posted and helping with incident validation and executive communication.
Operational Artifacts: IOCS & YARA Rules
For supported groups, the module exposes structured Indicators of Compromise (IOCs) and YARA rules that can be fed into SIEMs, EDRs and detection pipelines – enabling faster detection and threat hunting against real, observed ransomeware campaigns.
Negotiation & Press Intelligence
When data exists, you can view negotiation traces, related press coverage, and CSIRT / regulatory notices, helping you understand how high-profile each case is, and how similar incidents are handled globally.
Leaked Credentials Exposure Check
As an additional capability, the engine can check if a given domain appears in known leaked credential datasets, returning structured details (emails, usernames and other attributes where available). This helps you quickly assess whether your organization (or key supplier) has exposed accounts linked to ransomware and other breaches.