cl0p Ransomware Victim: elandretail-com-kmall24-com

NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog page and reposted here for awareness.

SCREENSHOTS, PII and LINKS have been automatically removed before posting here. If you want to see that content you can visit the tor url located here:
hXXp://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad[.]onion/elandretail-com-kmall24-com

cl0p

Native name 이랜드그룹
Type Private
Industry Conglomerate
Headquarters Seoul, South Korea
Services Fashion, retail, dining, construction
Website
elandretail.com
The official press release says that the personal data of users was not affected. It’s a lie.
The company has allowed card data to be read from its stores for a year or more.
To understand how this works, here are some articles:

https://www.nuix.com/blog/howd-they-do-part-2-you-stole-my-credit-card-number
https://www.blackhat.com/docs/asia-15/materials/asia-15-Singh-The-Underground-Ecosystem-Of-Credit-Card-Frauds-wp.pdf

Quoting from the article:
“The point to note here is that Track 1 data is sufficient information when dealing
with card dumps. It contains enough information to be converted into Track 2
dump as well. There are online tools available as well to do the conversion with
ease. Trackgenerator.net is one such online service. Most of the online carding
forums sell track 2 data
.”

Starting tomorrow, we will be uploading 100,000 card dumps as track 2 every day, this is valuable information that can be used to steal money from customer accounts.
The owners refuse to cooperate and acknowledge the incompetence of their systems engineers, leaving us no choice…

1ST 100k TRACK2 CREDIT CARD RECORDS
2ND 100k TRACK2 CREDIT CARD RECORDS
3RD 100k TRACK2 CREDIT CARD RECORDS
4TH 100k TRACK2 CREDIT CARD RECORDS
5TH 100k TRACK2 CREDIT CARD RECORDS
6TH 100k TRACK2 CREDIT CARD RECORDS
7TH 100k TRACK2 CREDIT CARD RECORDS
8TH 100k TRACK2 CREDIT CARD RECORDS
9TH 100k TRACK2 CREDIT CARD RECORDS
10TH 100k TRACK2 CREDIT CARD RECORDS





To get additional information, please download the Tor Browser and then visit the onion site located here: (to defang, remove the [.] and replace with . Also change hXXp to http) You can then copy and paste it into the Tor browser to get updates regarding this victim of cl0p Ransomware