Ransomware Victims on Dark Web – 06th March, 2025

Ransomware Victims on Dark Web – 06th March, 2025
Table of Contents
    Add a header to begin generating the table of contents

    This report summarizes recent ransomware attacks across various sectors, detailing the victims, threat actors, and available information on the incidents. Due to the nature of ransomware attacks and the often-redacted information publicly available, details may be limited in some cases. The information presented here is compiled from publicly available sources and should not be considered exhaustive.

    Note: No files or stolen information are hosted or disclosed in this report. Any legal issues relating to the content of the files should be directed at the attackers directly. This summary is solely for informational purposes.

    Law Diary (USA) – Skira

    Threat Actor: Skira
    Victim: Law Diary (USA)
    Industry: Legal Support Services
    Details of Breach: The ransomware leak page for Law Diary indicates that the company, which specializes in providing legal research and case tracking services, has been compromised. This breach poses significant risks to sensitive legal data, including client information and case details. Although the specifics of the compromised data are not detailed, the situation underscores the importance of cybersecurity within the legal sector. A screenshot related to the incident is included, but specific download links are not provided.


    Krisala Developer (India) – Skira

    Threat Actor: Skira
    Victim: Krisala Developer (India)
    Industry: Real Estate
    Details of Breach: The ransomware leak page for Krisala Developers reveals a significant data breach, exposing sensitive information related to various construction projects. The breach was discovered on March 6, 2025, and raises concerns regarding the operational integrity and privacy of client data. A screenshot associated with the leak is available, showcasing aspects of the company’s operations, although no download links are provided for the compromised data.


    City Government Office in Van (Turkey) – Skira

    Threat Actor: Skira
    Victim: City Government Office in Van (Turkey)
    Industry: Local Government
    Details of Breach: The ransomware leak page for the City Government Office in Van highlights the potential exposure of sensitive governmental data. This administrative body is crucial for local governance, and the breach raises concerns about data security and the implications for public administration. The leak was noted on March 6, 2025, but lacks specific details about the nature of the compromise or sensitive information.


    The 19 Biggest Gitlabs – Fog

    Threat Actor: Fog
    Victim: Various Organizations
    Industry: Multiple
    Details of Breach: The ransomware leak page presents a list of various organizations potentially affected by a data breach, including links to their respective GitLab repositories. However, specific details regarding a particular victim or individual case are not apparent. The absence of clearly defined headings and the lack of explicit details suggest that the page serves as a generic catalog of victims rather than focusing on a single incident.


    Eumetsat – Fog

    Threat Actor: Fog
    Victim: Eumetsat
    Industry: Meteorological Services
    Details of Breach: The ransomware leak page for Eumetsat indicates that multiple organizations have been affected by recent cyber incidents. While specifics about the nature of the data compromised are not disclosed, the presence of various entities across different sectors suggests a widespread impact. The lack of download links and detailed descriptions limits the available context for analysis.


    Blue Planet – Fog

    Threat Actor: Fog
    Victim: Blue Planet
    Industry: Technology Consulting
    Details of Breach: The ransomware leak page for Blue Planet includes a list of organizations with their corresponding website links and Git repository URLs. While specific details about any individual case were not apparent, the compilation emphasizes a broad range of potential targets across various sectors. The lack of explicit details about the compromises indicates a more general overview rather than focusing on specific incidents.


    Melexis – Fog

    Threat Actor: Fog
    Victim: Melexis
    Industry: Technology
    Details of Breach: The ransomware leak page for Melexis showcases a list of multiple organizations that may have been implicated in recent cyber incidents. However, specific details regarding the nature of the compromises or sensitive information have not been disclosed. The absence of images and downloadable links suggests that the focus remains on providing a directory of potentially compromised organizations.


    Inelmatic – Fog

    Threat Actor: Fog
    Victim: Inelmatic
    Industry: Manufacturing
    Details of Breach: The ransomware leak page for Inelmatic indicates a data breach involving various organizations. Specific details about the compromise are not provided, and the page lacks images or download links, which limits context for analysis. This suggests a focus on listing potentially impacted organizations without disclosing sensitive information.


    Kr3m – Fog

    Threat Actor: Fog
    Victim: Kr3m
    Industry: Media and Gaming
    Details of Breach: The ransomware leak page for Kr3m contains a compilation of various organizations, indicating potential data breaches. Specific details about the nature of the compromise are not provided, and the absence of download links and images suggests a focus on listing victims rather than disclosing sensitive information. The lack of a clear compromise date adds to the ambiguity regarding the incident.


    Kotliva – Fog

    Threat Actor: Fog
    Victim: Kotliva
    Industry: Agriculture
    Details of Breach: The ransomware leak page for Kotliva presents a list of various companies, similar to the Kr3m incident. It lacks specific details about individual breaches, focusing instead on a directory of potentially compromised organizations. The absence of downloadable content or images implies that the information is meant for awareness rather than direct access to sensitive data.


    Elite Advanced Laser Corporation – Akira

    Threat Actor: Akira
    Victim: Elite Advanced Laser Corporation
    Industry: Manufacturing
    Details of Breach: The ransomware leak page for Elite Advanced Laser Corporation reveals that over 90 GB of sensitive data has been compromised, including financial documents and employee/customer contact information. The leak includes instructions for downloading the data via a torrent client, raising serious security concerns for the company. The incident highlights the need for enhanced cybersecurity measures within the technology sector.


    Flightsim Studio – Fog

    Threat Actor: Fog
    Victim: Flightsim Studio
    Industry: Software Development
    Details of Breach: The ransomware leak page for Flightsim Studio lists various organizations potentially affected by a data breach. While specific details about the nature of the compromise are not provided, the presence of multiple URLs highlights possible vulnerabilities. The page lacks downloadable content and images, focusing on a general overview of impacted entities.


    Euranova – Fog

    Threat Actor: Fog
    Victim: Euranova
    Industry: Computer support and services
    Details of Breach: The ransomware leak page for Euranova features a list of organizations with associated URLs, suggesting potential data breaches. However, specific details regarding the nature of the compromise are not disclosed. The absence of download links and images indicates a focus on notifying about potential threats rather than providing sensitive information.


    Neopoly – Fog

    Threat Actor: Fog
    Victim: Neopoly
    Industry: Software provider
    Details of Breach: The ransomware leak page for Neopoly presents a compilation of organizations that may have experienced a data breach. It lacks specific details about individual cases, and there are no download links or images available. This structured listing emphasizes potential vulnerabilities without disclosing sensitive content.


    Aeonsparx – Fog

    Threat Actor: Fog
    Victim: Aeonsparx
    Industry: Game development
    Details of Breach: The ransomware leak page for Aeonsparx includes a list of various organizations alongside their websites and GitLab links. Specific details about individual breaches are not available, and the lack of download links suggests that the focus is on raising awareness about the potential impact of cyber incidents across multiple sectors.


    FHNW – Fog

    Threat Actor: Fog
    Victim: FHNW
    Industry: Education
    Details of Breach: The leak page for FHNW lists multiple organizations that may have been affected by ransomware incidents. The specifics of the breaches remain vague, and the page does not contain images or download links, indicating a focus on listing potential victims rather than providing detailed information about any specific incident.


    Manning Publications Co. – Fog

    Threat Actor: Fog
    Victim: Manning Publications Co.
    Industry: Publishing
    Details of Breach: The ransomware leak page for Manning Publications Co. showcases a compilation of companies with their corresponding URLs. Specific details about the nature of the compromise are not provided, leaving the exact impact ambiguous. The absence of downloadable content or images points to a focus on publicizing the potential risks rather than revealing sensitive data.


    Bizcode – Fog

    Threat Actor: Fog
    Victim: Bizcode
    Industry: Unknown
    Details of Breach: The ransomware leak page for Bizcode lists multiple organizations that may have been affected by a data breach, including links to their respective websites and Git repositories. However, specific details regarding the compromise, including sensitive data, are not disclosed. The absence of download links and images suggests that the page mainly serves as a directory of potentially compromised entities without providing explicit evidence of the breaches.


    1X Internet – Fog

    Threat Actor: Fog
    Victim: 1X Internet
    Industry: Software provider
    Details of Breach: The ransomware leak page for 1X Internet contains a compilation of various organizations alongside their websites. While it indicates potential vulnerabilities across multiple sectors, no specific details about individual compromises are provided. The lack of downloadable content and images further emphasizes that the focus is on listing affected entities rather than detailing specific incidents of data exposure.


    Engikam – Fog

    Threat Actor: Fog
    Victim: Engikam
    Industry: Unknown
    Details of Breach: The ransomware leak page for Engikam features a list of organizations with their corresponding URLs. Specific details about the nature of the compromise are not available, and the page does not include any download links or images. This suggests that the leak primarily serves as an informational resource about potentially impacted organizations, raising awareness of cybersecurity risks without disclosing sensitive information.


    Summary

    VictimThreat ActorIndustryDetails of Breach
    Law Diary (USA)SkiraLegal Support ServicesPotential exposure of sensitive legal data; screenshot included.
    Krisala Developer (India)SkiraReal EstateSignificant breach; sensitive project data at risk; screenshot available.
    City Government Office in Van (Turkey)SkiraLocal GovernmentPotential data exposure; critical for public administration; details unspecified.
    The 19 Biggest GitlabsFogMultipleGeneric catalog of victims; no specific details or download links.
    EumetsatFogMeteorological ServicesMultiple organizations affected; lack of specific compromise details.
    Blue PlanetFogTechnology ConsultingDirectory of organizations with no explicit details about breaches.
    MelexisFogTechnologyList of organizations; no specific details or images provided.
    InelmaticFogManufacturingData breach indication; focus on listing organizations without sensitive data.
    Kr3mFogMedia and GamingCompilation of organizations; no specific details or download links provided.
    KotlivaFogAgricultureList of victims; lacks detailed descriptions of breaches.
    Elite Advanced Laser CorporationAkiraManufacturing90 GB of sensitive data compromised; download instructions provided.
    Flightsim StudioFogSoftware DevelopmentGeneral overview of impacted entities; no specific breach details.
    EuranovaFogComputer support and servicesCompilation of organizations; lacks specific details about data compromise.
    NeopolyFogSoftware providerStructured listing of potential victims; no download links or images.
    AeonsparxFogGame developmentList of organizations with links; no explicit breach details.
    FHNWFogEducationVague details about potential incidents; no images or download links.
    Manning Publications Co.FogPublishingBroad listing of companies; no specific breach information disclosed.
    BizcodeFogUnknownCompilation of organizations; no specific details or download links provided.
    1X InternetFogUnknownList of victims; lacks detailed descriptions of breaches.
    EngikamFogUnknownDirectory of organizations; no specific breach information disclosed.
    Andreyev EngineeringRansomhubEngineering ServicesVisual content leak; no download links available.
    Family Community Health CenterRansomhubHealthcareEight images related to the incident; no download links available.
    Cimenyan DesaFunksecLocal GovernmentBreach indicates vulnerabilities; minimal user impact.
    InternetWayAPOSTelecommunicationsSerious incident; sensitive data accessed; screenshots available.
    Netcom-WorldAPOSTelecommunicationsRansomware attack discovered on March 4; screenshots of sensitive data.
    Ewald ConsultingBianLianAccountingEngagement opportunities; no sensitive data leaks.
    Iovate Health SciencesClopHealth SupplementsCompromise of internal documents; screenshot included.
    Legal Aid Society of Salt LakeBianLianNon-Profit Legal ServicesCollaborative opportunities; no sensitive data leaks.
    Rockhill Women’s CareQilinHealthcareData set for download on March 11; significant privacy concerns.
    GoenconRansomhubHeating & A/CVisual content leak; no download links available.
    PeruzziQilinAutomotive SalesData available for download on March 11; sensitive customer information at risk.
    BPM MicrosystemsQilinTechnologySignificant breach; data available for download on March 11.
    Seabank GroupLynxHospitality and TourismPotential exposure of operational data; no download links available.
    Wendy Wu ToursKillsecTravel and TourismSignificant breach; concerns about customer data exposure.
    Tata TechnologiesHuntersEngineering ServicesData exfiltration incident; sensitive information potentially accessed.
    Ray Fogg Corporate PropertiesAkiraReal Estate75 GB of documents at risk; sensitive financial data exposed.
    Grupo Baston AerossolFogManufacturing88.3 GB of sensitive information compromised; no download links available.
    Keystone Pacific Property Management LLCBianLianProperty Management4.5 terabytes of data at risk; focus on severity of breach without exposing files.
    Mosley Glick O’Brien, Inc.BianLianAccounting1.2 TB of data at risk; no download links provided.
    FANTIN GroupAkiraManufacturing14 GB of sensitive information compromised; risks to privacy and security.
    PampiliFogChildren’s Products36.3 GB of data exposed; includes sensitive employee information.
    PFS GrupoQilinConsultancyCommitment to innovation; sanitized data; no download links available.
    365labs – Security CorpMontiSecurity ServicesFull leak indicated; significant public interest; no direct access to sensitive files.

    Related Posts